Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Run untrusted Linux software securely

Up
vote
Down

PaX team developers Justin Korelc and Ed Tittel explain how to secure your environment using compiler extensions as a first-line defense when running unverified third-party software.
This first line of defense begins with recompilation of existing software code bases. This recompile uses specialized compiler extension functionality to safeguard against stack-based boundary violations. Although using these kinds of extensions is not a silver bullet, they can mitigate the effects of potentially harmful application side-effects arising from inexpert coding practices.
 read more | mail this link | score:3242 | -janewalker6847, January 26, 2006
More Sysadmin articles...

Abstract Art in Tallahassee

admin headlines

Installing Apache2, PHP5, MySQL on Fedora 19

Virtual Users/Domains with Postfix/Courier/MySQL/SquirrelMail (Debian 7)

Tutorial: Install Apache2, PHP5, MySQL on OpenSUSE 12.3

Tutorial: Serve CGI Scripts with Nginx on Fedora 18

Tutorial: Automated File Replication on 2 Storage Servers with GlusterFS on CentOS 6.3

ROSA Marathon 2012 Disk Encryption

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin