Remove Linux Remove Open Source Remove Research Remove Security
article thumbnail

10 essential Linux tools for network and security pros

Network World

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.

Linux 197
article thumbnail

University of Minnesota banned from contributing to Linux kernel

The Verge

The University of Minnesota has been banned from contributing to the Linux kernel by one of its maintainers after researchers from the school apparently knowingly submitted code with security flaws. The possibility of bugs slipping through is well-known in the open-source software community.

Linux 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open-sourced Technology Levels the Playing Field Between Tech Giants and Startups

CTOvision

The contest between proprietary technology and open source has been ongoing for a decade.Today, some of the most premium technology is open-sourced and free. Even Google's highly prized Borg software is becoming open-sourced. Government push for open source software.

article thumbnail

How a university got itself banned from the Linux kernel

The Verge

Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. None of the University of Minnesota researchers would talk to me for this story.

Linux 126
article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 112
article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

(Stacklok Photo) A pair of cloud computing vets are jumping back into entrepreneurship with a new startup that helps enterprises vet software supply chains amid a rise in cyber-breaches stemming from open-source code. It also recommends security enhancements, helping developers throughout the development process.

article thumbnail

UNCOVERING VULNERABILITIES IN OPEN SOURCE LIBRARIES

ForAllSecure

In recent articles, ForAllSecure has discussed how we were able to use our next-generation fuzzing solution, Mayhem, to discover previously unknown vulnerabilities in several open source projects, including Netflix DIAL reference , Das U-Boot , and more. What Language is the Target Written In? How Does This Target Accept Input?