Home Blog Page 10497

Apple moves for control

Author: JT Smith

ZDNet cites a series of moves by Apple Corp lately, accusing the company of trying to gain, as the article says, control.

New round of DDoS attacks could be on horizon

Author: JT Smith

MSNBC is reporting on a warning that many computers are compromised and could be used in a new wave of distributed denial of service attacks, similar to what we saw in February.

Category:

  • Linux

Popular pine programme vulnerability

Author: JT Smith

SecurityFocus is reporting that a common un*x mail client is vulnerable to remote denial of service attacks. The site claims that pine is vulnerable to a malformed-header attack which can render the programme useless until an offending email message is removed.

Category:

  • Linux

HP’s Superdome: One big box

Author: JT Smith

A CRN story talks about the high-end server’s capabilities:
“The system comes in three configurations that scale from two to
64 processors, 192 PCI slots and 256 Gbytes of memory. Initial
editions run PA RISC chips, but the systems can be upgraded to
the IA-64 processor family in the future. The server supports
HP-UX 11, the company’s current Unix version, as well as the
upcoming HP-UX 11i. It also supports Linux and Windows NT.”

Category:

  • Unix

Creating the Open Source Development Lab

Author: JT Smith

How’d Linux supports get IBM, Intel and other tech heavyweights to back the Open Source Development Lab? LinuxWorld has a story about the lab’s beginnings.

Category:

  • Open Source

Linux 2.4: Coding in public

Author: JT Smith

CRN has a story about the coming release of Linux 2.4: “It’s not your father’s way of making an operating system.

Creation of the next version of Linux,version 2.4, the first
version of the OS expected to be widely adopted
commercially, isn’t occurring behind closed doors. Day after day,
far-flung developers are grinding out new source code and
patches for Linux in full public view.”

Category:

  • Linux

Using binary packages to distribute software

Author: JT Smith

Linux.com has an article on the transition in recent months away “from the traditional
source distribution of software using tarballs towards a more ‘user-friendly’
approach of binary packages destined for use on a specific platform.”

Category:

  • Open Source

London to host ApacheCon

Author: JT Smith

ApacheCon 2000, which may be the largest gathering of Apache ssers in Europe ever, will be in London in October.
The details are at Apache Week.

Security hole in screen in Red Hat Linux 5.2 and earlier

Author: JT Smith

The security advisory is at LWN.net: “Screen allows the user to overload the visual bell with a text message that
can be set by the user. This text message is handled as a format string,
instead of as a pure string, so maliciously written format strings are
allowed to overwrite the stack. Since screen in Red Hat Linux 5.2 and
earlier releases was setuid root, this security hole could be exploited to
gain a root shell.”

Category:

  • Linux

Report: Sun shipping drivers without source

Author: JT Smith

From a story at LinuxGram: “A gaping hole has been discovered in the GNU General Public License (GPL), the legal
document at the heart of open source, and dear Sun has driven a Mack truck named
Solaris x86 straight through it.

At least that’s how open source demigod Bruce Perens assesses the situation and he’s
the primary author of the “Open Source Definition,” the philosophical basis of the open
source movement.”