Home Blog Page 10320

Could stolen Microsoft code lead to more security breaches?

Author: JT Smith

From ZDNet UK: “The theft of Microsoft’s code could mean more security breaches, say
experts

Computer security experts are concerned that the possible theft of Microsoft
source code may lead to widespread security problems with its software, if
malicious crackers gain access to key hidden features.”

Category:

  • Linux

Say ‘No, thanks’ to offers of ‘illegal’ MS software

Author: JT Smith

Linux Journal gives this advice: “If anything claiming to be illegally copied Microsoft source code shows up on the Net, do not download or read it. If you do, you will lose the right to work on free
software.”

Category:

  • Linux

Transmeta nears IPO

Author: JT Smith

The Standard has a preview story about Transmeta going public Oct. 30. “If priced at the middle of the range
of $11 to $13 per share, the IPO would value the company at
more than $1.5 billion and would raise $156 million for the
chipmaker.”

Category:

  • Open Source

Patent office accepts electronic applications

Author: JT Smith

From GCN.com: “The Patent and Trademark Office has begun taking patent applications over the Internet.

The new Electronic Filing System, which went into operation today, uses a public-key infrastructure system to encrypt and digitally sign
submissions.”

Security advisory to ypbind

Author: JT Smith

The advisory’s at LWN.net: There are several security problems in ypbind, the daemon used by
NIS clients for binding to their NIS server(s). First, there is a
potential buffer overflow; it is not clear whether it is possible
to exploit it at all. Second, there is a denial of service attack
against ypbind that can make it run out of file descriptors.

Category:

  • Linux

Linux Journal presents ALS Best of Show Awards

Author: JT Smith

It’s at Linux Journal, of course. Is your project on the list?

Category:

  • Linux

Security advisory for ncurses

Author: JT Smith

The advisory is at LWN.net: The ncurses library is used by many text/console based applications
such as mail user agents, ftp clients and other command line utilities.
A vulnerability has been found by Jouko Pynnnen
in the screen handling functions: Insufficient boundary checking leads
to a buffer overflow if a user supplies a specially drafted terminfo
database file. If an ncurses-linked binary is installed setuid root,
it is possible for a local attacker to exploit this hole and gain
elevated privileges.

Category:

  • Linux

Matra Datavision, SGI France join forces on 3D project

Author: JT Smith

From a press release at LinuxPR: Matra Datavision and SGI France announce the
joint promotion of a powerful development combination of Open
CASCADE open source 3D modeling components and Silicon Graphics
230 Visual Workstation platforms using the SGI ProPack 1.2 OpenGL
driver for Linux systems. This combination will allow CAD/CAM/CAE,
AEC and GIS developers and users on Linux platforms to obtain viewing
results for complex 3D models on a level with those of top-performance
Unix and Windows NT platforms.

Freedom fighters cracked Microsoft?

Author: JT Smith

Without any evidence whatsoever, Salon.com suggests the Open Source community has a motive: “The antagonistic dynamic that exists between
Microsoft and free-software hackers is
unavoidably obvious to anyone who has been
following the growth of open-source software
over the past few years … In
Europe, distaste for and distrust of
out-of-control American capitalism are widely
acknowledged motivating forces for
free-software hacking. Open vs. proprietary — it’s the good vs.
evil foundation of the hacker worldview. Hatred of Microsoft
keeps some hackers up at night, plotting their own software-led
world domination.”

Category:

  • Linux

Letter to AMA: Open Source medical software is the future

Author: JT Smith

LinuxMedNews posts this letter to the American Medical Association: “The future calls. Opportunity knocks. The song of hope sings: free and open
source medical software may become abundant in the near future and has
the best 1, 2, 3 chance for making the reach of medicine exceed its grasp. It
simply requires leadership in the form of funding, acceptance and
widespread advocacy of these efforts. The seeds of the future are sown, but
it won’t change overnight. Generational change is what’s occurring. Over
and over again the free and open way has succeeded in the past. While
closed-source efforts have yielded fragmentation, non-existence, or
expensive failure.”

Category:

  • Linux