 | Wednesday September 8, 2010
|
Linux Today Security ASSESSING THE TUX STRENGTH: PART 1 - USERSPACE MEMORY PROTECTION "Probably every attack mitigation technique that has been developed over time to mitigate memory corruption exploits can be implemented and used in one form or another in a Linux operating system." ASSESSING THE TUX STRENGTH: PART 2 - INTO THE KERNEL "The previous article in this series on Linux security described different userspace protection mechanisms that can be applied to protect binaries on a Linux system. Unsurprisingly, without additional kernel settings and protections most of the previously described mechanisms cannot be utilised to their full extent." THE EFFECT OF SNAKE OIL SECURITY "Bad security isn?t just bad because it allows you to be exploited. It?s also a long term cost center. But more interestingly, even the most worthless security tools can be proven to ?work? if you look at the numbers. Here?s how." Cloud Computing 101: Get Free eBook! Cloud computing can cut costs, speed implementations, and scale quickly. Download this Internet.com eBook now. Click Here. | Interested in placing your TEXT AD HERE? Click Here |
|
You are subscribed to an Internet.com newsletter as theonlinenewsletter@hotmail.com. To unsubscribe from this newsletter, please click here.
If you wish to be removed from all future Internet.com emails, please click here.
To unsubscribe via postal mail, please contact us at:
Internet.com
Attn: Newsletter Subscription Dept.
307 5th Ave., 14th Floor
New York, NY 10016
Please include the email address which you have been contacted with.
No comments:
Post a Comment