Is the Linux process insecure?

    Date: 05/18/05 (Open Source)    Keywords: security

    Time for me to play devil's advocate again.The Schneier Wave graph to the right may be the most famous diagram in computer security. It's named for Bruce Schneier of Counterpane, a leading computer security expert. As Schneier explained back in 2001, vulnerability to a security bug is highest between the moment the problem is revealed [...]

    Source: http://blogs.zdnet.com/open-source/?p=280&part=rss&tag=feed&subj=zdblog

« Without Wetware, what? || Security and the Linux process »


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home