security holes

Debian project today released a pair of security updates to plug at least ten security holes in its core called Linux kernel. Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. This update has been rated as having important security impact.

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }

Red Hat issued an update version of Linux operating system core called kernel that plugs various security holes for RHEL 5.x. This update has been rated as having important security impact. All users are advised to upgrade kernel package.

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }

Canonical Ltd has issued updates for its Kernel package to plug multiple security holes. A security issue affects all Ubuntu Linux versions.

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }

Honeypot is a computer system set up as a trap for computer attackers. If intruders are always scanning the Internet for potential victims and they are can you find the intruders and their exploits by putting up fake networks that only a deliberate scan could find? That’s the theory behind honeypots. Peter Mikhalenko discusses the […]

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }

Do you wonder how to write a program that accepts incoming messages with a network socket? Have you ever just wanted your own Web server to experiment and learn with? Have you ever wondered how a Web server actually works? Experiment with nweb — a simple Web server with only 200 lines of C source […]

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }

Hackers (read as cracker) attacking on unpatched versions of the Mambo content management system that can be used to build botnets for use in phishing scams and distributed denial of service (DDoS) attacks. They are using PHP-based CMS mass-exploitation and other vulnerabilities in open source CMS applications. If you are in server, collocation businesses then […]

{ Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum. }