learn unix and linux commands

Software Security Top 10 Surprises


 
Thread Tools Search this Thread
# 1  
Old 01-09-2009
Software Security Top 10 Surprises

Gary McGraw, Brian Chess, and Sammy Migues interviewed nine executives running top software security programs, and wrote an article for InformIT.  Some results showed that we are still not doing enough, even at our best.  Some showed that some of the things we stress most heavily are actually wrong.  The article is summarized in a bullet list.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

TR : surprises me

I am not able to see why tr is behaving surprisingly strange. I am pasting the commands and output. see if anyone can explain the mystery. arbhvp02% echo "p-20050608-Ajyd-g.jpg" | tr "p-20050608-A''-g.jpg" "p-20050608-A''-g.jpg" p-20050608-AjYD-g.jpg arbhvp02% echo "p-20050608-Ajjyd-g.jpg"... (6 Replies)
Discussion started by: RishiPahuja
6 Replies

2. UNIX for Dummies Questions & Answers

TOP software

Hi..Does anyone know where can I get the TOP software? I need to run it on my SUN Sparc 20 server with SUN Solaris 2.6. (1 Reply)
Discussion started by: dawn_lwf
1 Replies
Login or Register to Ask a Question
CHCON(1)							   User Commands							  CHCON(1)

NAME
chcon - change file security context SYNOPSIS
chcon [OPTION]... CONTEXT FILE... chcon [OPTION]... [-u USER] [-r ROLE] [-l RANGE] [-t TYPE] FILE... chcon [OPTION]... --reference=RFILE FILE... DESCRIPTION
Change the security context of each FILE to CONTEXT. With --reference, change the security context of each FILE to that of RFILE. -h, --no-dereference affect symbolic links instead of any referenced file --reference=RFILE use RFILE's security context rather than specifying a CONTEXT value -R, --recursive operate on files and directories recursively -v, --verbose output a diagnostic for every file processed -u, --user=USER set user USER in the target security context -r, --role=ROLE set role ROLE in the target security context -t, --type=TYPE set type TYPE in the target security context -l, --range=RANGE set range RANGE in the target security context The following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one takes effect. -H if a command line argument is a symbolic link to a directory, traverse it -L traverse every symbolic link to a directory encountered -P do not traverse any symbolic links (default) --help display this help and exit --version output version information and exit AUTHOR
Written by Russell Coker and Jim Meyering. REPORTING BUGS
Report chcon bugs to bug-coreutils@gnu.org GNU coreutils home page: <http://www.gnu.org/software/coreutils/> General help using GNU software: <http://www.gnu.org/gethelp/> COPYRIGHT
Copyright (C) 2009 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. SEE ALSO
The full documentation for chcon is maintained as a Texinfo manual. If the info and chcon programs are properly installed at your site, the command info coreutils 'chcon invocation' should give you access to the complete manual. GNU coreutils 7.1 July 2010 CHCON(1)