Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Run untrusted Linux software securely

Up
vote
Down

PaX team developers Justin Korelc and Ed Tittel explain how to secure your environment using compiler extensions as a first-line defense when running unverified third-party software.
This first line of defense begins with recompilation of existing software code bases. This recompile uses specialized compiler extension functionality to safeguard against stack-based boundary violations. Although using these kinds of extensions is not a silver bullet, they can mitigate the effects of potentially harmful application side-effects arising from inexpert coding practices.
 read more | mail this link | score:4442 | -janewalker6847, January 26, 2006
More Sysadmin articles...

Buy Fine Art on Canvas Online

admin headlines

Testing the Digital Ocean $5 Cloud Servers with an MMORPG

USB Redirection hack on Two Node Controller+Compute Neutron GRE+OVS Fedora 20 Cluster

10 basic examples of Linux ps command

Installing Debian testing On GPT HDDs From A Grml Live Linux

Running ownCloud 5.0 On Nginx (LEMP) On Debian Wheezy

Step By Step Ubuntu 13.04 (Raring Ringtail) LAMP Server Setup

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin