unix and linux commands - unix shell scripting

Software Security Top 10 Surprises


 
Thread Tools Search this Thread
# 1  
Old 01-09-2009
Software Security Top 10 Surprises

Gary McGraw, Brian Chess, and Sammy Migues interviewed nine executives running top software security programs, and wrote an article for InformIT.  Some results showed that we are still not doing enough, even at our best.  Some showed that some of the things we stress most heavily are actually wrong.  The article is summarized in a bullet list.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

TR : surprises me

I am not able to see why tr is behaving surprisingly strange. I am pasting the commands and output. see if anyone can explain the mystery. arbhvp02% echo "p-20050608-Ajyd-g.jpg" | tr "p-20050608-A''-g.jpg" "p-20050608-A''-g.jpg" p-20050608-AjYD-g.jpg arbhvp02% echo "p-20050608-Ajjyd-g.jpg"... (6 Replies)
Discussion started by: RishiPahuja
6 Replies

2. UNIX for Dummies Questions & Answers

TOP software

Hi..Does anyone know where can I get the TOP software? I need to run it on my SUN Sparc 20 server with SUN Solaris 2.6. (1 Reply)
Discussion started by: dawn_lwf
1 Replies
Login or Register to Ask a Question
RUNCON(1)							   User Commands							 RUNCON(1)

NAME
runcon - run command with specified security context SYNOPSIS
runcon CONTEXT COMMAND [args] runcon [ -c ] [-u USER] [-r ROLE] [-t TYPE] [-l RANGE] COMMAND [args] DESCRIPTION
Run COMMAND with completely-specified CONTEXT, or with current or transitioned security context modified by one or more of LEVEL, ROLE, TYPE, and USER. If none of -c, -t, -u, -r, or -l, is specified, the first argument is used as the complete context. Any additional arguments after COMMAND are interpreted as arguments to the command. Note that only carefully-chosen contexts are likely to successfully run. Run a program in a different security context. With neither CONTEXT nor COMMAND, print the current security context. CONTEXT Complete security context -c, --compute compute process transition context before modifying -t, --type=TYPE type (for same role as parent) -u, --user=USER user identity -r, --role=ROLE role -l, --range=RANGE levelrange --help display this help and exit --version output version information and exit AUTHOR
Written by Russell Coker. REPORTING BUGS
Report runcon bugs to bug-coreutils@gnu.org GNU coreutils home page: <http://www.gnu.org/software/coreutils/> General help using GNU software: <http://www.gnu.org/gethelp/> COPYRIGHT
Copyright (C) 2009 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. SEE ALSO
The full documentation for runcon is maintained as a Texinfo manual. If the info and runcon programs are properly installed at your site, the command info coreutils 'runcon invocation' should give you access to the complete manual. GNU coreutils 7.1 July 2010 RUNCON(1)