Security Linux News for Feb 22, 2000
PRNewswire: Butler International Announces Linux Upgrade to Application Testing Facility (2000-02-22 21:11:49)
"Linux provides us with a unique opportunity to deploy low cost
solutions to support our services, and our clients. The low total
cost of ownership, combined with the open architecture of the
operating system, gives us the ability to provide more value to our
Silicon.com: Windows 2000 Special: Safe as houses? (2000-02-22 20:17:35)
"...there are limitations in the OS which will become
increasingly apparent - not least that the success of alternatives
like Linux means it's unlikely to be an entirely Microsoft
enterprise in the future."
BW: SSH Communications Security Announces SSH Secure Shell 2.1 (2000-02-22 19:51:37)
"SSH Secure Shell, with the graphical file transfer interface,
is ideal for securely maintaining Web servers, Unix servers, as
well as for accessing corporate resources from home and
SRO: It's Time To Take A Stand [to Protect Against DDoS Attacks] (2000-02-22 15:48:35)
"Yahoo's site, for example, even during the worst portions of
the storm, never completely failed. In no small part, that is
because Yahoo relies upon a distributed network architecture
provided by Inktomi."
ComputerWorld: HP Offers Site Insurance (2000-02-22 15:13:43)
"...will offer companies up to $2 million in insurance if they
suffer revenue losses during a security breach involving HP Unix
systems. ...may later extend to Linux and Windows NT
LinuxPR: Angstrom Microsystems Launches First Complete Linux Powered eCommerce Solution (2000-02-22 03:58:58)
"Angstrom reduces time-to-market by offering a menu of
Linux-based pre-configured and easy-to-operate solutions such as
web, cache, application, email, firewall security, database &
Debian Security Advisory: New version of make released (2000-02-22 00:31:58)
"The make package as shipped in Debian GNU/Linux 2.1 is
vulnerable to a race condition that can be exploited with a symlink
attack. make used mktemp while creating temporary files in /tmp.
and that is a known potential security hole, as documented in the
man page of mktemp."
FreeBSD Security Advisory: FreeBSD-SA-00:04.delegate (2000-02-22 00:16:12)
"An optional third-party port distributed with FreeBSD contains
numerous remotely-exploitable buffer overflows which allow an
attacker to execute arbitrary commands on the local system,
typically as the 'nobody' user."