Canonical Design Blog: Design museum exhibition London


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Canonical Design Blog: Design museum exhibition London
# 1  
Old 12-20-2010
Canonical Design Blog: Design museum exhibition London



Something exciting Next year
Bruno Maag from Dalton Maag has been asked by the Design Museum London to put on an exhibition of his work. This is a collaboration between ourselves and DM,
the exhibition will be in two parts a substantial part of which will be featuring the Ubuntu font.

read more



More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Web Development

Ideas for a New Mobile Design

Does anyone have any favorite mobile tech sites they want me to look at while I'm considering the next phase of mobile redesign? My idea is to build a new mobile design without using any forum framework (do not use vBulletin, XenForo, etc.) and do not use any big SPA Javascript frameworks (do... (2 Replies)
Discussion started by: Neo
2 Replies

2. UNIX for Advanced & Expert Users

SFTP Design

Hi all, I'm seeking an efficient and secure means of providing multiple named users access to files by their functional areas. For security, I've chosen SFTP using key pair authentication. The general principle is we have multiple users as follows: We have two type of files for Function... (2 Replies)
Discussion started by: Bagpuss
2 Replies

3. Shell Programming and Scripting

Automate database design changes!

I need to create a script to automate creating a deployment for me by taking into consideration two input files. 1. design file of entire database, it has the entire database create statements. 2. logs which point to database objects that need to be fixed like below: ... (2 Replies)
Discussion started by: Samuel12
2 Replies

4. Shell Programming and Scripting

Design Search string

I've notepad in which logs are present. I need to design a web page by which if some one paste their ticket number and click on "search" the logs for that ticket number should be displayed at the bottom. I need some advice on how to do this and which is the right platform to do this. Regards... (1 Reply)
Discussion started by: ilugopal
1 Replies

5. UNIX for Dummies Questions & Answers

using nano x to design GUI

Hi, I am working on a project to develop an embedded device that can transfer files between two usb devices ( pen drives). We are using an NUC950A ARM9 microcontroller and we've put the Linux 2.1 kernel on the development board and it works. Can i use nano -x to design my own GUI so that i can run... (3 Replies)
Discussion started by: dilumcc
3 Replies

6. Shell Programming and Scripting

shell design

i want to design the shell for some basic commands such as cp mkdir rm mv etc... so please let me know how to start and wich all books to refer and if any body is having the model just mail me at, devskamat018@gmail.com:) i will be waiting please reply soon (1 Reply)
Discussion started by: devaray
1 Replies

7. Shell Programming and Scripting

I want to design a program

i want to make a shell program. This program i give a current day and the result is to appear the celebrity and birthday(birthday and celebration is 2 txt files). In addition this procedure must do for a space day in future or past depend on user choice. Finally the program can run and as... (2 Replies)
Discussion started by: mytilini boy
2 Replies

8. Programming

C++ class design

Can anybody tell me what is the best website or books to read for getting good knowledge in doing C++ class design. Please leave cplusplus.com or bjorne stroustrup. Other than these is there any website or book. Please do tell me (0 Replies)
Discussion started by: dhanamurthy
0 Replies
Login or Register to Ask a Question
_SECURE_PATH(3) 					   BSD Library Functions Manual 					   _SECURE_PATH(3)

NAME
_secure_path -- determine if a file appears to be secure LIBRARY
System Utilities Library (libutil, -lutil) SYNOPSIS
#include <sys/types.h> #include <libutil.h> int _secure_path(const char *path, uid_t uid, gid_t gid); DESCRIPTION
This function does some basic security checking on a given path. It is intended to be used by processes running with root privileges in order to decide whether or not to trust the contents of a given file. It uses a method often used to detect system compromise. A file is considered 'secure' if it meets the following conditions: 1. The file exists, and is a regular file (not a symlink, device special or named pipe, etc.), 2. Is not world writable. 3. Is owned by the given uid or uid 0, if uid is not -1, 4. Is not group writable or it has group ownership by the given gid, if gid is not -1. RETURN VALUES
This function returns zero if the file exists and may be considered secure, -2 if the file does not exist, and -1 otherwise to indicate a security failure. The syslog(3) function is used to log any failure of this function, including the reason, at LOG_ERR priority. SEE ALSO
lstat(2), syslog(3) HISTORY
Code from which this function was derived was contributed to the FreeBSD project by Berkeley Software Design, Inc. BUGS
The checks carried out are rudimentary and no attempt is made to eliminate race conditions between use of this function and access to the file referenced. BSD
May 2, 1997 BSD