Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Run untrusted Linux software securely

Up
vote
Down

PaX team developers Justin Korelc and Ed Tittel explain how to secure your environment using compiler extensions as a first-line defense when running unverified third-party software.
This first line of defense begins with recompilation of existing software code bases. This recompile uses specialized compiler extension functionality to safeguard against stack-based boundary violations. Although using these kinds of extensions is not a silver bullet, they can mitigate the effects of potentially harmful application side-effects arising from inexpert coding practices.
 read more | mail this link | score:3477 | -janewalker6847, January 26, 2006
More Sysadmin articles...

Buy Fine Art Prints Online

Selected articles

Librenix T-Shirts and Coffee Mugs!

Space Tyrant: Multithreading lessons learned on SMP hardware

Scripting: A parallel Linux backup script

Missing the point of the Mac Mini

The life cycle of a programmer

The short life and hard times of a Linux virus

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin