Linux vulnerable to infiltration
Linux source code could be infiltrated by dubious elements, including spies, according to a white paper released by Dan O'Dowd, chief executive officer of Green Hills Software Inc.
This is his second white paper in a series that his company describes as being focused on "the urgent security threat posed by the use of the Linux operating system in U.S. defense systems, including the Future Combat System and Global Information Grid."
Provocatively titled "'Many Eyes' - No Assurance Against Many Spies," Tuesday's paper debunks the fallacy that the "many eyes" with access to Linux source code ensure that it is free of Trojan horses or other malicious software.
By LinuxWorld staff at Computerworld.
[ Read more ]
- Review: Essential System Administration Pocket Reference (5 January 2004)
- Review: HackNotes Linux and Unix Security Portable Reference (24 October 2003)
- Review: Linux Security Cookbook (29 September 2003)
- Review: Linux Server Hacks (10 September 2003)
- Review: Linux+ Certification Bible (3 September 2003)
- Review: Hacking Exposed Linux 2/e (8 May 2003)
- Review: Linux Administration Handbook (30 April 2003)
- Review: Linux System Security: The Administrator's Guide to Open Source Security Tools, 2/e (14 March 2003)
- Review: Real World Linux Security, 2/e (22 November 2002)
- Review: Linux System Administration - A User's Guide (18 August 2002)
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.