Interview with Scott Mann, co-author of Linux System Security: The Administrator's Guide to Open Source Security Tools, 2/e
by Mirko Zorz - Wednesday, 26 March 2003.
I think that it has been slowed by the dot com bomb, but the evidence that it is moving into the enterprise is everywhere. Even IBM offers Linux on an LPAR and they've got customers using it. The biggest limiting factor with its adoption in the enterprise, I believe, is the knowledge required to provide various higher end functionality. It is one thing to set up a Linux desktop or server, another to configure a Beowulf cluster. Because there is limited support for Linux, administrators have to become much more knowledgeable. Although this is also true with commercial UNIX systems (Solaris, AIX, HP-UX, etc.), those commercial companies offer a variety of support services including customization and consulting. Often, with Linux, the best support available is a newsgroup or email alias. Having said that, though, there are many companies that are offering customized Linux solutions - it's a very different business model and not as prevalent as commercial UNIX offerings.

I believe that it definitely provides a boost to security, generally. Anything that can be done for security can be done on a Linux box more cost effectively and, because of the open source nature of Linux, more customizably.

What do you think about the full disclosure of vulnerabilities?

I've always felt that full disclosure of vulnerabilities is critical. The bad guys are going to find out about them whether they're disclosed or not. By disclosing them fully, administrators minimally have an opportunity to do something about them.

What are your future plans? Any exciting new projects?

Right now, I'm enjoying C++ and Java coding and fixing old cars in my spare time. I'm doing a lot with networking these days, so I'll probably end up doing some work on the network administration book.


Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Oct 24th