Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Run untrusted Linux software securely

Up
vote
Down

PaX team developers Justin Korelc and Ed Tittel explain how to secure your environment using compiler extensions as a first-line defense when running unverified third-party software.
This first line of defense begins with recompilation of existing software code bases. This recompile uses specialized compiler extension functionality to safeguard against stack-based boundary violations. Although using these kinds of extensions is not a silver bullet, they can mitigate the effects of potentially harmful application side-effects arising from inexpert coding practices.
 read more | mail this link | score:3753 | -janewalker6847, January 26, 2006
More Sysadmin articles...

Fine Art Online Gallery

Selected articles

Currency Traders Telnet Game

VPS: Xen vs. OpenVZ

Apple DIY Repair

The Supreme Court is wrong on Copyright Case

Programming Language Tradeoffs: 3GL vs 4GL

Graffiti Server Download Page

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin