21 entries found:
) Next »
Command chaining is a concept to execute two or more commands in one shot to increase .. productivity Reduce system resource usage(In some cases ) Short and sweet codes . In this post we will see how to use different command chaining operators available for us in an easy way. Command chaining operators & –Forking
Jungo Announces USBware Support for the Samsung SC241x Multipurpose Micro-Processor
As part of its 10th anniversary, IBM’s alphaWorks took a look at how things started and what’s yet to come.
Linux Platform Products revenue grows 30 percent year-over-year - Identity and Access Management revenue up 46 percent year-over-year - Announces voluntary stock-based compensation review.
AppArmor is a product that Novell acquired when they bought the company Immunix in May 2005. It provides an interesting alternative to traditional security measures. AppArmor works by profiling the applications that it is protecting. A profile records the files that an application needs to access, and the capabilities it needs to exercise, during normal, "good" operation.
LXer Feature: 04-Aug-2006
GNU/Linux -- Like No Other Hotrod, Ever
While others appear to be going backwards, Linux just keeps racing ahead.
'Linux supports more devices, "out of the box", than any other operating system ever has.'
"Yes, that's right, we support more things than anyone else. And more than anyone else ever has in the past. Linux has a very long list of things that we have supported before anyone else ever did."
-- Greg Kroah-Hartman, OLS 2006 Keynote
When it acquired Immunix in 2005, Novell gained the security tool it now calls AppArmor. Today, all of the community can benefit from the security application, as Novell has announced the release of AppArmor's source code under the GPL.
The trend of open source consolidation continues, as last week saw Novell snap up Linux security vendor Immunix, while open source stalwart IBM bought out tiny GlueCode, a maker of application server middleware based on Apache and Java.
Novell last week said it has acquired Immunix, a 7-year-old company founded in part with money from the Department of Defense's central R&D organization to develop security software for Linux.
Novell acquires Immunix, a leading Linux security program, to add server protection to its Linux server line.
Northern Territory's department of corporate and information systems (DCIS) has issued a white paper requesting proposals for its second generation whole of government desktop outsourcing contract which includes provisions for an open source solution.
Snags Immunix, a small company that sells software designed to improve the security of programs running on Linux servers.
According to Immunix COO Frank Rego, his company's decision to stop selling Immunix Linux wasn't a sudden shift but "more of a gradual change. We started in the appliance business with Trend Micro and Websense in the middle of last year." There was a layoff this week, but not a huge one. Rego says the company is now down to 20 employees from a high of about 25. He also says he hopes the company can start turning a profit by the end of 2004 -- but admits that he is an optimist.
There were 15 security alerts issued last week:
- 5 from Debian
- 1 from Fedora
- 1 from Immunix
- 3 from Mandrake
- 1 from Mozilla
- 2 from Red Hat
- 1 from SUSE
- 1 from Trustix
Paul Starzetz and Wojciech Purczynski report finding a flaw in the mremap(2) system call due to a missing function return value check. While they found the flaw on the 2.4 series of Linux kernels, the 2.2 series of Linux kernels is also vulnerable to the same problem.
Note that this is considered beta software and not recommended for production use. There is still some work left on it before we consider it a real Trustix release.
So why do we release it? We feel we're getting close to a point where this version of TSL is ready for release, but would like more input from our users before releasing this as a proper 2.1 release.
There were 25 security alerts issued last week.
Greg MacManus, of iDEFENSE Labs, reports finding several potentially
exploitable buffer overflows in XFree86's font code.
This week, advisories were released for the Linux kernel, lftp, ethereal, screen, BIND, libnids, mpg321, nd, jabber, zebra, fsp, and vbox3. The distributors include Conectiva, Debian, Guardian Digital EnGarde Secure Linux, Fedora, Immunix, Mandrake, Openwall, Red Hat, Slackware, SuSE, Trustix, and Turbolinux.
) Next »