Home Blog Page 9551

Torvalds asks for moratorium on new device number assignments

Author: JT Smith

Posted at LWN.net: “Linus Torvalds has requested a moratorium on new device number
assignments. His hope is that a new and better method for device space
handing will emerge as a result.

Alan Cox has requested that I maintain a forked registry for his -ac
kernel patch tree. I have agreed to do so once I have forked off the
‘final’ version of the registry for Linus’ tree. At that time I will
process the backlog for the benefit of the -ac registry only. Please
have patience until I can get that to happen.”

Category:

  • Linux

New FileMaker Software now runs on Linux

Author: JT Smith

From PR Newswire:

To meet the needs of changing
and more mobile workgroups, today FileMaker announced a new line of database
software to run on five more platforms: Mac OS X , Windows 2000, Linux,
Pocket PC and i-mode. Supporting more platforms — plus improved fit with IT
requirements and rich new Web publishing features — gives workgroups the
flexible, instant data management they demand, FileMaker said.

A letter to operating system designers

Author: JT Smith

From LinuxNewbie.org: “Linux, Microsoft, Apple! It’s so confusing! which operating system is best? I’m
here to tell you, as briefly as possible, that it doesn’t matter. First of all, the
majority of users are like me; they see their operating system for no more than
three seconds, before launching their favorite application. Second, we know you
all want money, even the Linux companies. also, we know you’re in bed with the
hardware companies.”

Category:

  • Linux

Nemein implements Midgard 2

Author: JT Smith

From LinuxPR: Nemein Solutions has created the first commercial
implementation in the world that uses Midgard 2 in its structure.

Midgard 2 is the next generation version of the Midgard content management
engine. Midgard 2 has been designed from the ground up as a flexible general
purpose application server.

The other Slashdot effect

Author: JT Smith

osOpinion has a column about the number of “SlashClones” popping up on the Internet, and how some of this is a good thing, as long as they don’t try to too closely rip off the original Slashdot. “Slashdot has changed the nature of the conversation on the Internet. This is the other Slashdot effect. Just ask any Anonymous Coward.” (Slashdot and NewsForge are owned by the same company.)

Covalent Technologies named to Upside Magazine’s ‘hot list’

Author: JT Smith

From BusinessWire: Covalent Technologies has been named as a recipient of one of UPSIDE Magazine’s sixth annual Hot 100 Awards. This award adds to Covalent’s
growing momentum over the last six months, which has included multiple Fortune 500 customer wins, significant new funding led by Sequoia Capital,
and the release of a comprehensive enterprise product suite for the Apache Web server.

Lawyers find profit in dot-com stock disasters

Author: JT Smith

EcommerceTimes has a story about the 89 class-action lawsuits involving securities fraud filed in federal court so far this year, many against tech companies and their IPO underwriters. VA Linux is prominent in the story. (VA owns NewsForge.)

Category:

  • Open Source

ATTC announces Open Source presentation May 15

Author: JT Smith

From LinuxPR: The Applied Technology Training Center and Puget Sound Technology are
offering a short presentation about BSD, Linux, and open source software on
May 15 in Everett, Wash.

Everett Community College’s Applied Technology Training Center and Puget
Sound Technology are offering a short presentation about BSD, Linux, and open
source software on Tuesday, May 15, from 6:30 to 7:30 p.m., at the Applied
Technology Training Center in Everett, Wash.

ESR: How many backdoors are there in Microsoft webservers?

Author: JT Smith

– By Eric S. Raymond –

Today, Yahoo is carrying the news that Microsoft has admitted the
existence of a back door in its IIS webserver that could affect
hundreds of thousands of websites worldwide . This comes barely
two weeks after the revelation that another, unrelated bug in IIS
permitted crackers to gain root access to sites running IIS 5.0 and
Windows 2000 — the latest, greatest versions of Microsoft’s flagship
OS and web server.

Editor’s note: The Yahoo article apparently has been pulled because of questions about the accuracy of the story. Slashdot has an update to the story. Here’s the official word from Microsoft. ESR’s piece continues with some interesting points …

It’s not exactly news that Microsoft’s products are hideously
insecure; these really serious incidents are taking place against a
background that includes almost weekly announcements of some new macro
virus or attachment trojan propagated through Microsoft Outlook. One
might almost be tempted to yawn if these bugs weren’t annually costing
computer users worldwide billions of dollars worth of downtime, lost
opportunities, and skilled man-hours.

But there is something about this incident that deserves special
attention. This most recent security hole was *not* a bug — it was a
deliberate back door inserted by Microsoft engineers.

When Microsoft spokespeople said that the back door was “absolutely
against
our policy,” they were doubtless intending to be reassuring. But on
second
thought, that statement should strike fear into the heart of any MIS
manager
relying on Microsoft products. Because the inevitable next question is
this:
if backdoors can find their way into Microsoft’s production releases
against
Microsoft’s own policy, *how many more undiscovered ones are there*?

Microsoft doesn’t know. Nor does anyone else. The only people who
could tell us are other rogue Microsoft employees like the unnamed
culprits behind today’s backdoor. And they aren’t talking.

Back doors and security bugs, like cockroaches, flee the sunlight.
There is only one way for software consumers to have reasonable
assurance
that they will not become victims of a back door — open source code.
The Apache web server that IIS competes against has never had a back
door,
because its code is routinely reviewed and inspected by a worldwide
developer community alert to the possibility. Any developer tempted
to insert one knows that it would be discovered and traced to him in
short other — thus, it’s never even been tried.

This illustrates a larger point. When you use closed source for a
security-
critical application, you must blindly trust *everyone* in the chain of
transmission — the developers who wrote it, the company that marketed
it,
and the people who made and shipped the physical media. Bad actors or
simple
mistakes at *any* of these stages can leave you with a computer begging
to be
owned by the first script kiddie who wanders along.

With open source, you have a check on the system. You can see inside;
you know what’s going on. This changes the behavior of everyone
upstream of you; the higher probability that a bug or backdoor will be
exposed keeps them honest even *before* the code is reviewed. If
Microsoft’s IIS had been open, whoever was responsible for today’s
back door would never have dared to insert it.

The few MIS managers who aren’t already evaluating open-source
software need to wake up and smell the coffee. Today’s backdoor
demonstrates that Microsoft can’t control its own employees well
enough to be trusted with your critical data. More fundamentally than
that, though, it reveals how deeply foolish and dangerous it is to
rely on closed-source software for any security-critical use.

As the security advantages of open source become clearer, managers who
persist in this mistake may find they are putting their own jobs at
risk. And deserving to lose them …

Editor’s note: This was an email Raymond sent to several news organizations Monday afternoon.

Category:

  • Linux

Microsoft admits to backdoor in IIS

Author: JT Smith

Slashdot readers talk abouta story at Yahoo.com saying that Microsoft has admitted that its engineers wrote a backdoor into a webserver product.

Category:

  • Linux