Ten years ago it didn’t seem like Linux growth could increase any faster. Then, in 2006, Amazon launched Amazon Web Services (AWS). Linux growth went from linear to exponential. AWS competitors sprang up and were acquired by IBM, Microsoft, and other big players, accelerating Linux expansion even more.
Linux became the platform of choice for the private cloud. But this movement wasn’t confined to the cloud. A rush to create Linux applications and services spilled over to traditional on premises. Linux had evolved from that obscure thing people ran web servers on to the backbone operating system of the majority of IT.
My friends often leave their computers open and unlocked. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. So I’ve created a simple project to hack my friends and show them the importance of computer security.
All I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command.
It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was out for revenge.
Earlier in the day, Brown – who was responsible for the bank’s IT systems – had attended a work performance review with his supervisor.
It hadn’t gone well.
Brown was now a ticking time bomb inside the organisation, waiting for his opportunity to strike. And with the insider privileges given to him by the company, he had more of an opportunity to wreak havoc than any external hacker.
A super-bug in the Xen hypervisor may allow privileged code running in guests to escape to the underlying host.
This means, on vulnerable systems, malicious administrators within virtual machines can potentially break out of their confines and start interfering with the host server and other guests. This could be really bad news for shared environments.
All versions of open-source Xen are affected (CVE-2016-6258, XSA-182) although it is only potentially exploitable on x86 hardware running paravirtualized (PV) guests. The bug was discovered by Jérémie Boutoille of Quarkslab, and publicly patched on Tuesday for Xen versions 4.3 to 4.7 and the latest bleeding-edge code.
The cybersecurity shortfall in the workforce remains a critical vulnerability for companies and nations, according to an Intel Security report being issued today.
Eighty-two percent of surveyed respondents reported a shortage of security skills, and respondents in every country said that cybersecurity education is deficient.
Memory protections and attack surface reductions.
Google has switched on new security features for the Linux kernel in Android, hoping to reduce vulnerabilities and to improve the robustness of its mobile operating system.
Android is built around the open source Linux kernel, the core computer program that controls the software running on devices, and the hardware they're built upon.
The Bash shell is a fundamental Linux tool and, in this era of containers and clusters and microservices, good old-fashioned Linux system administration skills are as relevant as ever. Today, we'll learn about running other command shells, Bash built-ins, configuration files, and shell expansion.
Remotely-distributed system administration teams provide around-the-clock coverage without anyone losing sleep, and have the benefit of drawing from a global talent pool. The OpenStack global infrastructure team relies on these five open source tools to communicate, and to coordinate our work.