TITLE

Hold in Linux Lining Closed With Patches

AUTHOR(S)
Adams, John
PUB. DATE
January 2004
SOURCE
Bank Technology News;Jan2004, Vol. 17 Issue 1, p13
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the implications of Linux security flaw on Linux system user. Risk of unlimited access by Linux machine users due to vulnerability in the Linux 2.4 kernal; Increase of Linux exposure in the financial services industry; Issuance of patches that corrected the kernal bug through Linux distributions. INSET: MESSAGE BOARD.
ACCESSION #
11978267

 

Related Articles

  • Windows 2000 looks like it's learned several important lessons regarding security. McClure, Stuart; Scambray, Joel // InfoWorld;02/07/2000, Vol. 22 Issue 6, p48 

    Focuses on the security-related features of the Windows 2000 operating system. Integration of Kerberos network authentication protocol in the system; Addition of built-in digital certificate technologies; Configuration of the Active Directory software.

  • Solaris app vulnerable, Sun verifies. Dyck, Timothy // eWeek;07/31/2000, Vol. 17 Issue 31, p17 

    Reports on Sun Microsystems Inc.'s confirmation of a Solaris operating environment vulnerability uncovered during `eWeek' Labs' Openhack interactivity security test. Security vulnerability in an optional component of Solaris; Expected availability of a patch to fix the problem.

  • Protect Electronic Data from Predators. Latamore, G. Barton // OfficePro;Aug/Sep99, Vol. 59 Issue 7, p9 

    Discusses the protection of hard drive data from a generation of self-e-mailing viruses. Tips on protection of the computer system from these viruses; Description of the different viruses that emerged; Prevention for the viruses to spread in computer system.

  • Defeating Computer Viruses. Hoffman, Mala // Westchester County Business Journal;12/3/2001, Vol. 40 Issue 49, pT1 

    Gives advice on protecting files against computer viruses. Need for caution in opening electronic mails; Degree of damage that can be incurred by computer viruses; Recommended anti-virus programs.

  • Instant Messaging Worm Threats.  // Database & Network Journal;Apr2005, Vol. 35 Issue 2, p17 

    Warns companies using Instant Messaging software for communications to be vigilant but pragmatic in educating their employees on the threats of continued worm attacks, according to the eema, the independent European association for electronic-business.

  • PROTECTING your PC. Dancer, Helen // Australian Women's Weekly;Aug2002, Vol. 72 Issue 8, p249 

    Offers suggestions on computer security from viruses. Types of computer viruses; Signs that a computer is infected by a virus; Measures to be taken upon getting a computer virus.

  • Securing your system.  // Australian PC User;Jan2008, Vol. 20 Issue 1, p66 

    The article offers a practical guide to keeping one's computer system safe. A firewall is the traffic cop on one's network. It decides what data makes it through and what does not. Modern firewalls can block specific ports and they can block specific applications. Port blocking is rather more...

  • Hands-Free Host Protection. Dineley, Doug; Garza, Victor R. // InfoWorld;12/6/2004, Vol. 26 Issue 49, p16 

    Evaluates the SecureCore "memory firewall" from Determina. Key features of the device that promises a no-fuss approach to thwarting the most dangerous types of computer virus attacks; Key features; Cost.

  • Spyware is a virus. Arquette, Brett // eWeek;11/1/2004, Vol. 21 Issue 44, p39 

    This article presents information on software parasites. Software parasites have become a big problem that the $200,000 worth of firewall, anti-virus, Web content and anti-spam tools can't protect. Spyware is a virus. Spyware loads without the user's permission, it runs invasive processes and it...

  • Sobigf--another virus nuisance. Sardoni, Ken // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p13 

    Examines the proliferation of computer viruses. Problems caused by a virus attack; Signs of an attack; Recommendations in avoiding or mitigating the effects of viruses.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics