LinuxSecurity.com Feature Extras:
What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.
(Aug 21) | ||
|
||
Mandriva: 2011:128: dhcp (Aug 18) | ||
|
||
Red Hat: 2011:1197-01: libvirt: Moderate Advisory (Aug 23) | ||
|
||
Red Hat: 2011:1196-01: system-config-printer: Moderate Advisory (Aug 23) | ||
|
||
Red Hat: 2011:1189-01: kernel: Important Advisory (Aug 23) | ||
|
||
Red Hat: 2011:1187-01: dovecot: Moderate Advisory (Aug 18) | ||
|
||
(Aug 25) | ||
|
||
SuSE: 2011-035: (Aug 23) | ||
|
||
Ubuntu: 1185-1: Thunderbird vulnerabilities (Aug 26) | ||
|
||
Ubuntu: 1196-1: eCryptfs vulnerability (Aug 23) | ||
|
||
Ubuntu: 1195-1: WebKit vulnerabilities (Aug 23) | ||
|
||
Ubuntu: 1193-1: Linux kernel vulnerabilities (Aug 19) | ||
|
||
Ubuntu: 1184-1: Firefox and Xulrunner vulnerabilities (Aug 19) | ||
|