Use of a new algorithm will allow Google to provide smaller, faster updates for its Chrome browser, and thereby significantly reduce server and network workload. For security updates in particular this results in a narrower window of vulnerability. In a blog post Stephen Adams describes the "Courgette" technique.
Read more »Courgette algorithm reduces Chrome update size
Root exploit for Linux kernel published
Brad Spengler, the developer behind the Grsecurity project, has published an exploit for a vulnerability in the Tun interface in Linux kernel 2.6.30 and 2.6.18, used in Red Hat Enterprise Linux 5 (RHEL5), which can be exploited by attackers to obtain root privileges. Of particular interest is the fact that the exploit is even able to circumvent security extensions such as SELinux.
Read more »A Linux security story
There's no such thing as perfect security. There are no programs that give you absolute software security. After all, security is a process, not a product. Linux's security process, though, is outstanding, which is one reason why it has great security. Here's an example.
Read more »- Login to post comments
Linux Kernel Virtual Machine improves build performance
Create a build service using the Linux Kernel Virtual Machine (KVM) for better performance
Read more »- Login to post comments
Gargoyle: Web Interface for Router Configuration
The Gargoyle project is working on an alternative web interface for better router configuration. The project has now reached its first stable version 1.0.
Read more »- Login to post comments
JITter Bug
Bugs are a fact of life in the technology world, and the Open Source community is no exception. What is exceptional, however, is the open way these vulnerabilities are handled, as the developers behind Mozilla's Firefox browser have aptly demonstrated.
Read more »- Login to post comments
GNOME 3.0 with more applications made in Mono
Just have a look at what will be gnome 3.0...here is it.. And along with the controversy found with Mono. Richard Stallman, a member of the GNOME Foundation, has said that GNOME 3.0 will include more applications made with Mono: "The only application that Mono is now part of the whole launch is Tomboy
Read more »- Login to post comments
DOM flaw can crash many browsers
The Luxembourg security specialists G-SEC have published details of a vulnerability in the majority of browsers which will either crash the browser or consume so much memory that it makes the computer virtually unusable. The trick is simple. Using JavaScript's DOM (Document Object Model), create a selection menu on the web page; a select element.
Read more »This Week on Github: Stupid Ruby Tricks
Ruby is a very dynamic language. You can turn the language inside out, give objects a frontal lobotomy, and stitch the whole thing back together again, all at runtime. Here are some examples.
Read more »- Login to post comments
Developers Can't Discount Human Nature
Every system designer has at one time in his or her professional career had to play the role of developer, sales person, and psychologist. The developer writes the code for the system, the sales person tries to sell it to management and the user community, and the psychologist tries to figure out why users don't buy into what they're selling.
Read more »- Login to post comments
Troubleshooting LTSP: SSH Key Regeneration
If you see this message you need to update the keys for your network card.
"This workstation isn't authorized to connect to server"
Read more »- Login to post comments
OpenSuSE, Ubuntu, Fedora, Mandriva Benchmarks
With it being a while since we last compared many Linux distributions when it comes to their measurable desktop performance, we decided to run a new round of tests atop four of the most popular Linux distributions: OpenSuSE, Ubuntu, Fedora, and Mandriva.
Read more »- Login to post comments
Why GNOME Do Is Built With C#
With all the recent heat generated about Mono and the C# language, it only seems appropriate to take a look at the issue from a programmer's perspective. There are a number of open source projects written in the C# language.
Read more »- Login to post comments
How Secure Is VMware's Virtualisation Lead?
There's plenty of competition for VMware in making virtualised data centres, despite its strong lead. Is now the time to switch to Hyper-V or XenServer, asks Cameron Sturdevant?
Read more »- Login to post comments
ack-grep – A grep-like program specifically for large source trees
Ack is designed as a replacement for 99% of the uses of grep. ack is intelligent about the files it searches. It knows about certain file types, based on both the extension on the file and, in some cases, the contents of the file.
Read more »- Login to post comments



