共查询到20条相似文献,搜索用时 140 毫秒
1.
2.
《信息安全与通信保密》2001,(5)
Red Hat某安全顾问日前宣 布Red Hat Linux新的netscape包已经推出,该包可用以解决某种环境下Java脚本操作过程中发生的漏洞。 相似文献
3.
4.
8月14日,惠普公司在一年一度的Linux World大会上宣布,开始为Debian Linux提供技术支持。同时,惠普也已经实现了Debian Linux在HP ProLiant和HP BladeSystem服务器上的运行。这两项内容成为行业主流厂商为Linux世界献上的厚礼,意味着越来越多的企业级Linux用户可以接受来自惠普的专业技术支持。至此,惠普已经可以为Red Hat、Novell SUSE及Miracle、Red Flag及Haansoft组成的Asianux基金会提供技术支持。特别值得一提的是,惠普与Linux著名代表厂商红帽(Red Hat)结成的合作伙伴关系已经成为惠普与Linux厂商联手为企业级用户提供… 相似文献
5.
让人又爱又怕的Linux总会在业界做出一些惊人之举。曾几何时,尽管Red Hat、SUSE LINUX,Turbo、Caldera这四大豪门都曾盛极一时,但他们却并没有让Linux改变让人又爱又怕的形象。相反,当Caldera并入SCO、SCO的掌门人宣布SCO将致力于Linux与UNX的融合的声音还没落地,却曝出了SCO对IBM因擅自将UNX的技术向Linux上移植而提出的起诉。一时间,用户对Linux又增加了因法律纠纷而 相似文献
6.
7.
8.
9.
10.
11.
Linux环境下syslog日志管理系统研究 总被引:1,自引:0,他引:1
随着Internet和网络应用系统的发展和普及,网络攻击行为不断升级,严重影响了系统的正常运行,系统安全问题已引起人们的高度重视.多数应用系统通常采用Linux作为服务器操作系统,日志是Linux系统重要的安全特性,对于系统安全极为重要.通过它可以方便地查找出系统错误或受到的攻击.基于对Linux Red Hat 9.0的研究,文中对syslog协议、日志服务器的建立以及使用logrotate对日志进行轮循管理进行了详细说明,还对Syslog日志管理系统的安全性进行了简要分析,提出了现有Syslog机制存在的问题和未来的发展方向. 相似文献
12.
针对嵌入式系统的应用和开发的需要,提供在ARM嵌入式平台上移植Linux系统的方法。在对Linux内核体系的研究基础上,分析往ARM平台上移植Linux需要的工作,可以提高系统的设计水平,缩短开发时间。ARM9选用的是三星公司的S3C2440,Linux内核版本号为2.6.30.4。介绍了嵌入式系统移植的主要过程,包括U-boot的移植与修改、Linux内核的配置和编译、根文件系统的定制。移植后Linux系统在ARM平台上运行良好。实验结果证明该方法是可行的,同时对其他嵌入式系统开发有一定的参考意义。 相似文献
13.
IPv6下基于IPSec的 VPN的研究与性能分析 总被引:1,自引:0,他引:1
IPv6与IPv4相比在安全方面具有很多特点,将IPSec集成到协议内部是IPv6的优势。在介绍IPv6协议概念基础上,重点研究实现VPN的关键技术——IPSec协议及其体系结构、工作模式和相关协议。最后提出利用FreeS/WAN软件包并通过修改Linux内核的方式来实现Linux系统上一种基于IPSec的VPN。 相似文献
14.
基于FAT32的文件隐藏方法及在Linux上的实现 总被引:2,自引:0,他引:2
针对现有基于FAT32的文件隐藏方法存在的不足,提出了一种通过修改目录项属性和重构FAT表项序列的文件隐藏方法;分析了Linux支持FAT32的重要数据结构和函数,利用Linux中的缓冲机制,在Linux操作系统上进行了方法实现。分析表明,该方法不仅能实现不依赖于操作系统的文件隐藏,而且隐藏方法简单,运算轻量,文件隐藏强度高。 相似文献
15.
This paper proposes a content addressable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blockThis paper proposes a content addressable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a block-level storage optimization, by employing the algorithms of chunking image file into blocks, the block-finger calculation and the block deduplication. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is achieved for Red Hat Enterprise Linux image files.level storage optimization, by employing the algorithms of chunking image file into blocks, the block-finger calculation and the block deduplication. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is achieved for Red Hat Enterprise Linux image files. 相似文献
16.
Richardson P. C. Xiang W. Mohammad S. 《Industrial Informatics, IEEE Transactions on》2006,2(4):231-241
This paper describes the results from a real-time network test bed for a Linux-based control system with event-driven message traffic. Interest has grown in the use of Linux as a cost-effective alternative to expensive proprietary real-time operating systems. However, kernel tasks in Linux can cause random delays in message transmissions. Event-driven traffic can result in unpredictable message inter-arrival rates. Nondeterministic delays in message transmissions and sporadic message arrival times complicate the design of the network as they require the use of an estimation technique to analyze feasibility. Random temporal behavior can lead to network overloads, where it becomes unavoidable that some messages will be late. We discuss the design and feasibility analysis for the network and evaluate the network's performance in the presence of random kernel delay and sporadic message arrivals. Three message scheduling approaches are evaluated using different Linux configurations at different levels of network loading 相似文献
17.
随着电子商务时代的到来,传统的开放平台已经不能满足企业应用开发迅猛增加的需要.通过对Linux平台上J2EE技术的综合运用,介绍了电子商务系统的实现方法,加强了电子商务系统的可扩展性、可重用性和可管理性,有效的降低了企业开发的成本,能够满足企业应用快速发展的需求. 相似文献
18.
雷达光栅显示技术在雷达应用中占有重要的地位,随着高分辨率、多彩色、高综合要求的不断提高,现代应用对雷达光栅显示技术提出了新的要求。提出了采用软件为主的设计思想,设计了基于Linux的软件化、网络化的通用雷达光栅显示终端,具有系统结构简单,开发周期短,易标准化和易改动等优点,对于提高系统可靠性、灵活性、降低成本等都具有十... 相似文献
19.
For various reasons, many of the security programming rules applicable to specific software have not been recorded in official documents, and hence can hardly be employed by static analysis tools for detection. In this paper, we propose a new approach, named SVR Miner (Security Validation Rules Miner), which uses frequent sequence mining technique [1 4] to automatically infer implicit security validation rules from large software code written in C programming language. Different from the past works in this area, SVR Miner introduces three techniques which are sensitive thread, program slicing [5 7], and equivalent statements computing to improve the accuracy of rules. Experiments with the Linux Kernel demonstrate the effectiveness of our approach. With the ten given sensitive threads, SVR Miner automatically generated 17 security validation rules and detected 8 violations, 5 of which were published by Linux Kernel Organization before we detected them. We have reported the other three to the Linux Kernel Organization recently. 相似文献