Search

Results 121-140 of 181 for hacker.

Jaunty Jackalope: Are Alarm Bells Ringing in Redmond?

With the release of Ubuntu 9.04 last week, it's not too surprising that few other topics got much attention on the Linux blogs in the ensuing days. Yes, there was a rather intriguing discussion of porn and piracy over on DaniWeb and LXer; and yes, a moderately active conversation fired up the Slashd...

Lilliputian Linux, and Do We Need More Critics?

Good things come in small packages, as they say, and that's perhaps never been more true than it is today, thanks to the emergence of increasingly diminutive devices equipped with Linux. Perhaps most notable of late is the $99 Marvell SheevaPlug, a wall-wart-sized device that runs Linux on a 1.2-GHz...

The Search for an Open Source Killer App for Web 2.0

A quiet battle of sorts is taking place behind the scenes in the software industry. Software as a Service and cloud computing have evolved, placing much more attention on Web-based applications. This greater focus has also raised expectations for the services delivered via Web 2.0. The open source s...

Google Turns Unshackled Android Loose on Devs

While the Google-backed Android gang is busy building applications and trying to get new phones manufactured, Google itself has ponied up a new unlocked device for developers: the Android Dev Phone 1. Basically, it's a "T-Mobile G1" that's SIM-unlocked and hardware unlocked, which will let users run...

Jailbreak Makes Android a Little More Open

It seems as though the wide-open door for the Google Android-based T-Mobile G1 wasn't nearly wide enough. Intrepid hackers have blown the door right off the hinges and shined a big spotlight inside the smartphone software. What did they find? Full root privileges to the G1 file system. Breaking into...

OPINION

It’s Time to Hack the Economy

The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...

Hackers Get Under Red Hat’s Skin

Red Hat issued a security advisory Friday notifying customers that some of its servers were compromised last week due to a network attack. The company called the advisory critical and said it sent out the alert primarily for those who may obtain Red Hat binary packages via channels other than those ...

Are VM Environments Open to Attack?

New adopters often see virtualization as the Holy Grail of enterprise computing. It enables consolidation of separate servers and databases to provide more economic operations. Running consolidated computers from one virtualized machine also eliminates the electrical waste spent to keep idling serve...

Security Wonks Reveal Holes in Firefox Straight Out of the Gate

As Mozilla went after a Guinness World Record for the most downloads in a 24-hour period with its release of Firefox 3, it didn't take security researchers long to drop a bomb on all the browsing fun. TippingPoint's DVLabs reported that its Zero Day Initiative program received a critical vulnerabili...

It Takes Community to Save the Planet

The power of community is grossly underestimated in this country. Current collaborative trends on the Internet, from Web 2.0 to Wikipedia models, are seen as merely social or arguably informative in nature. That's a bit like saying the U.S. Constitution, another collaborative work, is a fetching fli...

The Fall of Reiser

It is unusual, but not unheard of, for a murder case to go forward if a body has not been found. It is even rarer for the charge to be first-degree murder -- and less common still for the defendant to be found guilty. Those were the exact circumstances, though, under which Hans Reiser was convicted ...

MacBook Air, Vista Box PWNd – Ubuntu Stands Alone

After three days of attacks by leading hackers, a laptop running Ubuntu remained untouched while two others, running Mac OS X and Windows Vista Service Pack 1, succumbed. The attacks were launched at the CanSecWest PWN 2 OWN contest in Vancouver, Canada. This was sponsored by security firm TippingPo...

Linux: A Tempting Target for Malware?

The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops. That said, IT security and control firm Sophos recently issued a warning about potential virus infections targeting Linu...

Android, Schmandroid: Linux on the iPhone

Since its launch, renegade developers have been working to make the iPhone a Linux workstation, porting tools to the device. And why not? It has enough RAM and hard disk space to make the work worthwhile. "My iPhone has 16 GB of disk space, 128 MB of RAM, a 600-plus MHz processor and a much better d...

Dead Cow Cult Releases Google Hacking Kit to the Wild

The Cult of the Dead Cow hacker group -- which claims to be the world's most attractive hacker group -- has released Goolag Scanner, an open source tool that uses Google's search engines to look for vulnerabilities in Web sites. Goolag Scanner is either a Web auditing tool that can be used by securi...

Mozilla Dispatches Firefox Bug Zapper

Mozilla released an update Thursday that corrects several vulnerabilities in the Firefox Web browser. Firefox 2.0.0.12 patches critical flaws that could result in Web browsing history and forward navigation stealing; privilege escalation that could allow cross-site scripting exploits; and crashes wi...

Is Hidden Open Source Code Putting Your Apps at Risk?

Many companies are running software on their Web servers that contains open source code with known vulnerabilities, a security firm has found. Software risk management solutions firm Palamida has expanded its Vulnerability Reporting Solution detection capabilities to include 431 open source security...

Security Flaw Doesn’t Discriminate

Linux and Apple OS X users are usually insulated from the security woes of their Microsoft Windows counterparts, but that doesn't seem to be the case with a recent vulnerability involving the handling of Uniform Resource Identifier protocols. Those protocols instruct a browser to perform certain tas...

Canonical Resorts to Tough Love Over Server Outage

Canonical, the commercial sponsor of the Linux distribution Ubuntu, asserted there has to be some decisive Ubuntu community action to make sure it doesn't suffer another outage. Canonical had to shut down five of eight servers in order to avert potential hacker attacks earlier this month. "Either th...

Mozilla Relieves Firefox, Explorer Security Headache

Mozilla, maker of open source Web browser application Firefox, released a new version of the program that fixes a security issue stemming from an interaction between Microsoft's Internet Explorer and Firefox. Version 2.0.0.5 of Firefox was made available for download on Wednesday. The problem -- fir...

LinuxInsider Channels