Linux vulnerable to infiltration
Linux source code could be infiltrated by dubious elements, including spies, according to a white paper released by Dan O'Dowd, chief executive officer of Green Hills Software Inc.
This is his second white paper in a series that his company describes as being focused on "the urgent security threat posed by the use of the Linux operating system in U.S. defense systems, including the Future Combat System and Global Information Grid."
Provocatively titled "'Many Eyes' - No Assurance Against Many Spies," Tuesday's paper debunks the fallacy that the "many eyes" with access to Linux source code ensure that it is free of Trojan horses or other malicious software.
By LinuxWorld staff at Computerworld.
[ Read more ]
- Review: Essential System Administration Pocket Reference (5 January 2004)
- Review: HackNotes Linux and Unix Security Portable Reference (24 October 2003)
- Review: Linux Security Cookbook (29 September 2003)
- Review: Linux Server Hacks (10 September 2003)
- Review: Linux+ Certification Bible (3 September 2003)
- Review: Hacking Exposed Linux 2/e (8 May 2003)
- Review: Linux Administration Handbook (30 April 2003)
- Review: Linux System Security: The Administrator's Guide to Open Source Security Tools, 2/e (14 March 2003)
- Review: Real World Linux Security, 2/e (22 November 2002)
- Review: Linux System Administration - A User's Guide (18 August 2002)
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.