Monday, March 31, 2008

Unhacked Linux - Sent Using Google Toolbar

Unhacked Linux

DesktopLinux
Home  |  News  |  Articles  |  Forum  |  Polls  |  Blogs  |  Videos  |  ITLink

Keywords: Match:
Unhacked Linux
Mar. 31, 2008

Blog: The Mac went down in two minutes. The Vista SP1 PC made it two days. Only the Sony VAIO VGN-TZ37CN laptop running Ubuntu 7.10 survived the CanSecWest PWN to OWN PC hacking contest.

The rules were simple. Hackers had to "read the contents of a designated file on each system through exploitation of a zero-day code execution vulnerability" through a direct wired connection. The successful hacker system would get to keep it, hence the PWN to OWN name, and a cash prize. The competition was sponsored by TippingPoint Technologies' (a network security company) ZDI (Zero Day Initiative).

While neither the hackers nor TippingPoint revealed the details of the hacks, we do know which programs were cracked. In the case of Mac OS X running on a MacBook Air, the Safari Web browser proved to be the crack in Mac OS X's armor. With Windows Vista SP1 on a Fujitsu U810, Adobe Flash proved to be its Achilles' heel.

In theory, the Flash vulnerability is cross-platform. In other words, the same hole might be used to crack Linux or other operating systems.

Since we don't know exactly how the security breach works, we can't be certain, though, that the same problem could be used successfully against Linux.

What we do know is that with cash money on the line, not to mention ownership of a nice new PC, Linux came out untouched.


Steven J. Vaughan-Nichols



Do you have comments on this story?

Talkback here

NOTE: Please post your comments regarding our articles using the above link. Be sure to use this article's title as the "Subject" in your posts. Before you create a new thread, please check to see if a discussion thread is already running on the article you plan to comment on. Thanks!


(Click here for further information)


7 Advantages of D2D Backup
For decades, tape has been the backup medium of choice. But, now, disk-to-disk (D2D) backup is gaining in favor. Learn why you should make the move in this whitepaper.

4 Legal Reasons to Control Internet Access
The Internet is obviously a valuable resource for many organizations. However, many are exposed to legal liability concerns because they fail to control Internet access. Learn if you're safe in this white paper.

Rapidly Resolve J2EE Application Problems
Whether you are in the process of building J2EE applications or have J2EE applications already running in production, you must ensure that they deliver the expected ROI. Learn how in this white paper.

Load Testing 2.0 for Web 2.0
There are many unknowns in stress testing Web 2.0 applications. Find out how to test the performance of Web 2.0 in this white paper.

Build Better Games Online
For the game infrastructure providers, life is complex. Making money from games has become more complicated. Why? Find out in this white paper.

Building a Virtual Infrastructure from Servers to Storage
This white paper discusses the virtual storage solutions that reduce cost, increase storage utilization, and address the challenges of backing up and restoring Server environments.

Gaining Faster Wireless Connections with WiMAX
Welcome to what is quickly becoming the hyperconnected world where anything that would benefit from being connected to the network will be connected. Learn more in this white paper.

Is Your Desktop a Security Threat?
The new wave of sophisticated crimeware not only targets specific companies, but also targets desktops and laptops as backdoor entryways into those business' operations and resources. Learn how to stay safe in this white paper.

Increasing SAN Reliability by 100 Percent
Storage area networks (SAN) are a strong part of storage plans. Learn how to increase your reliability and uptime by 100 percent in this case study.

 



Got a HOT tip?   please tell us!

ADVERTISEMENT
(Advertise here)


Desktop Linux books

Join our Desktop Linux discussion forums:
•  Moving to Linux
•  Linux/Windows debate!
•  Linux Q&A
. . . and more

Linux vs. Windows
•  in the enterprise
•  in gadgets & devices
Most popular recent stories:
• A Vista vs. Linux matchup
• Choosing a desktop Linux distro
• Linus versus GNOME
• Why Windows wins and Linux loses
• The best free desktop Linux
• Why Windows Vista will suck
• 2006 Desktop Linux year in review
• The well-tempered Debian desktop
• Here come the Dell Linux desktops, laptops
• Seven Linux distros fight over one old ThinkPad
• Putting openSUSE 10.2 through its paces
• Results from the 2006 Desktop Linux Survey

BREAKING NEWS

• It was one bad security week for Apple
• Unhacked Linux
• Automatix development comes to an end
• UMPCs gain Novell SLED compatibility
• Is Firefox 3 ready for prime time?
• NComputing spreads I/O wealth
• Windows is caught between Mac and Linux
• A tale of two x86 computing appliances
• 15 years in the making, Wine 1.0 is in sight
• Waiting on the HP Linux desktop
• HP to preload Novell`s Desktop Linux on some machines
• Ubuntu 8.04 gets ready for beta
• Novell to announce new, expanded partnerships
• One-third of Asus Eee PC users to run Linux
• Why Wal-Mart won't have Linux desktops on its store shelves



Linux-Watch headlines:
• Opening up the open-source list
• Adobe AIRs out Linux, joins foundation
• And the top 15 open-source influencers are ...
• Expert claims legacy Java development is dead
• Red Hat posts great 2008 fiscal year earnings
• Terracotta builds Java clusters
• Report: Subscriptions to surge for open-source licensing
• Panel: Weakening economy good for open source
• SFLC announces a for-profit, open-source law firm
• Red Hat: More Customer involvement with community needed


Visit the...


news feed

Home  |  News  |  Articles  |  Forum  |  Polls  |  About  |  Contact
 
Use of this site is governed by our Terms of Service and Privacy Policy. Except where otherwise specified, the contents of this site are copyright © 1999-2008 Ziff Davis Enterprise Holdings Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Enterprise is prohibited. Linux is a registered trademark of Linus Torvalds. All other marks are the property of their respective owners.
Advertisement
Vibrant AdWhat's this?Close

Are you really protected?

Take the $10,000 Panda Challenge. You are not as protected as you think you are. Find out now!


www.takethepandachallenge.com

No comments: