Security is the Name of the Game
It's been a rough day here weather-wise, with snow and ice wreaking havoc on everything from the roads to internet service — we were fine without the roads, but the internet was more than we could take. The treacherous conditions outside set us thinking about conditions on the information superhighway, and so we bring you a roundup of interesting security news from the world wide web.
First up, if you haven't already heard and patched your Linux kernel, an exploit for vmsplice has been discovered that allows a local attacker to gain a root shell on your system. The exploit affects kernel versions from 2.6.17 to 188.8.131.52, and can be overcome with a quick patch available through a number of sources. Many distributions are already pushing the patch down the auto-update lines, so you may be patched without even knowing it.
You may have wondered where viruses and exploits — as well as their patches — come from once in a while, but you've probably never suspected it could be the same place. That was the case for Indian antivirus company AvSoft last week, when it was discovered that their website had fallen victim to an injection vulnerability and was hosting a variation of the Virut virus. The company is keeping quiet on the matter, but other prominent security companies have been quick to point out that it could happen to anyone.
While AvSoft's situation may not have been their fault, that's not the case for the French bank that lost more than seven billion dollars through rogue trading. Experts are now suggesting that the Société Générale had adequate security in place, but failed to properly manage it, giving Jerome Kerviel — a relatively low-level trader — the access he needed to rip the bank off for billions. There's a lesson to be learned here: change your password, or someone may steal a billion dollars from you.
Myspace is hardly likely to cost you a billion dollars — even if you forget to change your password — but it could cost you your job if you're not careful. We've all known for a while that employers are watching what we do on the web at work, and Googling us before we're hired, but new numbers drive the point home. According to a major placement firm, well over half of British execs are on social networking sites looking for information about applicants, while two-thirds said the information they found directly affected hiring. It's something to think about the next time you're tempted to upload those pictures of you doing body shots last weekend...
Finally, in a similar vein, email too can byte you in the tuchus, if you aren't careful. An attorney representing Eli Lilly produced a spectacular example of this last week when she tripped over Outlook's autocomplete and instead of sending confidential information about government negotiations to a fellow staffer sent them to the New York Times. Oops! The lesson in this? We think the obvious one is Be sure you send your messages to the right people, but perhaps Don't keep the New York Times in your address book is a good one too.
Now we're off to patch our kernel and clean out our address book — away!
Justin Ryan is a Contributing Editor for Linux Journal.
Practical Task Scheduling Deployment
July 20, 2016 12:00 pm CDT
One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of criteria. It's pretty easy to string these tools together to build even more powerful tools, such as a tool that finds all of the .log files in the /home directory and searches each one for a particular entry. This erector-set mentality allows UNIX system administrators to seem to always have the right tool for the job.
Cron traditionally has been considered another such a tool for job scheduling, but is it enough? This webinar considers that very question. The first part builds on a previous Geek Guide, Beyond Cron, and briefly describes how to know when it might be time to consider upgrading your job scheduling infrastructure. The second part presents an actual planning and implementation framework.
Join Linux Journal's Mike Diehl and Pat Cameron of Help Systems.
Free to Linux Journal readers.Register Now!
- SUSE LLC's SUSE Manager
- Murat Yener and Onur Dundar's Expert Android Studio (Wrox)
- My +1 Sword of Productivity
- Non-Linux FOSS: Caffeine!
- Managing Linux Using Puppet
- Doing for User Space What We Did for Kernel Space
- SuperTuxKart 0.9.2 Released
- Parsing an RSS News Feed with a Bash Script
- Google's SwiftShader Released
- Rogue Wave Software's Zend Server
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide