Linux Vulnerability News

Read about linux vulnerability news, The latest news, videos, and discussion topics about linux vulnerability news from alibabacloud.com

Analysis on the protection of Windows and Linux system permissions

The intermediary transaction SEO diagnoses Taobao guest Cloud host Technology Hall introduction no matter on which server system, any one file's execution must have certain permission, if the hacker obtains this permission, may use this flaw to run some hacker program, thus achieves the control entire computer the goal. Conversely, even if hackers can put some hacker programs uploaded to the server, due to the permissions of the problem, these hacker programs will not run, can not endanger our system.   For example Findpass is like this. 1 Windo ...

Is open source the culprit of the Heartbleed vulnerability?

The news about the Heartbleed vulnerability sparked heated discussions on the web. This loophole from the OpenSSL project allows an attacker to steal user information over a wide variety of encrypted and transmitted network data. As OpenSSL is widely used in web servers, mail protocols, and communication protocols, the number of users affected at a time Hard to estimate. The Heartbleed Vulnerability once again shows the vulnerability of cybersecurity, of course, for those who value security, which also gives them the opportunity to upgrade basic services, increase security ...

Practical Linux User account cleaning and security methods

Security is a huge and challenging subject, but everyone who works on the server side should know the basic steps. Cameron outlines some ways to keep your user account clean and secure. Security is a big problem. It's not going to be the same, and it's hard to know how much it needs to scale: if you're not careful, when your boss really wants to keep the doorman from seeing his annual budget, you finally believe that he needs to understand the benefits of security. No matter how challenging it is to keep up with trends in all aspects of computing security, there are several areas that are already sufficient ...

"Silicon Valley link" Adobe will close China Research and development company Windows will 7 curtain call

In the daily link to the Silicon Valley, the most fresh information! Silicon Valley here refers to a typical and innovative business representative abroad. 1. The extended scale of employee strikes in the Amazon has expanded http://tech.ifeng.com/a/20140925/40822386_0.shtml Beijing time September 25, according to Bloomberg reports, the Amazon German staff strike expanded to the fifth Logistics center, Time also extended a day. Ver.di, Germany's largest trade union, hopes to put pressure on Amazon to let the online retailer ...

The interpretation of humorous language 2014 major events in the IT field

Every week, the upbeat Phil Johnson helps to deliver important news and headlines in the tech world in a relaxed and enjoyable way.   --Boss, to be on the safe side, the IT department elves suggest you update your antivirus software and move Kim Jong-un from the "Bad Boy" list to the "Good Boy" list. December 24--Santa Claus has learned from Sony for years, it has been thought that the most wanted gift for the North Korean leader during Christmas is a sock coal. However, in the ...

A5 Source December Free construction site code update recommended

The intermediary transaction SEO diagnoses Taobao guest Cloud host technology Hall A5 source code for you to bring December the newest free website to update the recommendation CMS article: Dream Weaving Dedecms Brief introduction: Dream-Woven CMS is a simple, robust, flexible, open source, several major features of the open source content management system, is the leading open source CMS brand,   At present, the installation of the program has reached 700,000, more than 60% of the sites are using the dream-weaving CMS or core development based on the dream CMS. December UPDATE: Variable unfiltered comment exists ...

Long Fei: Talking about how to prevent the forum from being hacked

The intermediary transaction SEO diagnoses Taobao guest cloud host technology Hall Anhui Internet Alliance hosts the Thousand Person stationmaster lecture (http://www.53w.net) already to the 36th period, this issue guest Mao Wei Taihu Lake Pearl Network technical director, the very war net founder, the Chief network management, two Quan Net co-founder, one, the Taihu Lake Pearl Net ( thmz.com) is a comprehensive regional portal for providing full Internet (Internet) services in Wuxi and surrounding areas. Wuxi is the external publicity window, but also the outside world to understand the most ...

China Domain name report: More than half of our domain name server is unsafe

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys cloud host technology Hall August 26 news, the North Dragon Medium net carries the domain name registration management organization CNNIC to release the domestic first "China Domain Name service and the Security status report", "the report" shows that our country current domain name server total quantity nearly million, among them more than 50%   Domain name server is relatively insecure, and 57% of our important information systems have the risk of domain name resolution. The following is the "China Domain Name Service and security status report" Full text: report summary:-As of August 10, 2010, monitoring ...

Comparison of 3 well-known cloud manufacturers under hat-trick

September 23, virtualization technology for the Linux kernel Xen was given a hat-trick with 3 security vulnerabilities. Xen vulnerabilities can be jumped out of the virtual host environment (ultra vires), or read other user data, control the hypervisor itself (host). A remote attacker could exploit a vulnerability that could cause the host system to crash and deny service to legitimate users. Xen Vulnerabilities and impact range is not small, such as Amazon AWS Large-scale restart server-the entire repair cycle lasted 5 days (from September 25 7 o'clock in the afternoon to September 30 5 o'clock in the afternoon), impact ...

How to maintain server security

Server security is crucial to the enterprise. In recent years, servers have been at increased risk of "black hands." Recently, news of servers and viruses has been heard and hacked. First of all, these malicious attacks are designed to consume server resources, affect the normal operation of the server, and even attack the network where the server is paralyzed. On the other hand, they are acts of aggression, which are mostly related to certain interests. Some involve sensitive information of enterprises, and some of them are peers. No matter what, we have to protect the server security, and now, by the famous ...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.