Language Selection

English French German Italian Portuguese Spanish

Can You Completely Secure Linux?

Filed under
Linux

How does Red Hat go about building and developing a secure Linux operating system? That question was asked and answered at the Red Hat Summit this week by Josh Bressers, who heads the Red Hat Product Security Team.

Bressers explained that the security process involves both manual and automated activities for quality assurance. Linux is further reinforced with what Dan Walsh, senior principal software engineer at Red Hat called a "silver bullet" for Linux security -- SELinux.

"We have this unbelievable code that sees if someone is doing something stupid," Walsh said.

rest here




Also: Red Hat Looks Beyond Linux For Its Next Decade Of Growth

More in Tux Machines

Video: Headless ARM9 SBC boots Linux in less than a second

Technologic has posted a video demo of its fast-booting headless PC/104-expandable SBC, which runs Debian on a PXA16x SoC and includes a Lattice FPGA. Read more

UBOS -- a new Linux distro for personal servers and IoT devices

UBOS is a new Linux distro that aims to make it 10x easier to run server-side apps for yourself, or for your family, on hardware you own. Why give your valuable data to Google or some other data overlord, if you can keep it under your own control? All you need is a spare (physical, virtual, or cloud) computer that can run Linux. UBOS automates much of the administration, so you can get on with life. Want to use ownCloud instead of Dropbox? Shaarli instead of delicious? An RSS reader or an Internet-of-Things app? UBOS makes installation and maintenance easy and quick.

Slovak statisticians rely on open source for voting machines

The Slovak Republic’s Bureau of Statistics has used PCs running Ubuntu Linux for recording votes in the country’s municipal election on 29 November. Using open source saves money, says Štefan Tóth, Director Geneŕal of Informatics Section at the agency. For the bureau’s IT system administrators, Ubuntu proves easier to maintain and configure, and the software also withstands malware attacks better than the proprietary alternative, director Tóth confirms Read more