×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Linux 3.2 Has Been Released

samzenpus posted more than 2 years ago | from the check-it-out dept.

Open Source 271

diegocg writes "Linux 3.2 has been released. New features include support for Ext4 block size bigger than 4KB and up to 1MB, btrfs has added faster scrubbing, automatic backup of critical metadata and tools for manual inspection; the process scheduler has added support to set upper limits of CPU time; the desktop responsiveness in presence of heavy writes has been improved, TCP has been updated to include an algorithm which speeds up the recovery of connection after lost packets; the profiling tool 'perf top' has added support for live inspection of tasks and libraries. The Device Mapper has added support for 'thin provisioning' of storage, and a support for a new architecture has been added: Hexagon DSP processor from Qualcomm. New drivers and small improvements and fixes are also available in this release. Here's the full list of changes."

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered

271 comments

Btrfs (4, Interesting)

davegaramond (632107) | more than 2 years ago | (#38591738)

So does this mean I can start using btrfs, at least for personal workstations? I've got a new box at the office waiting to be setup, with a 120GB Corsair SSD as the main system disk, normal 2TB harddisk as backup/media storage. Will be using Debian. Should I use btrfs?

Re:Btrfs (5, Interesting)

Anonymous Coward | more than 2 years ago | (#38591786)

Short answer: no.

Long answer: Please! The more people exercising the code, the more bugs will be revealed, and the more confident the developers can be. But you will have to be ready for some performance regressions and data loss danger. For the brave.

Re:Btrfs (5, Interesting)

Anonymous Coward | more than 2 years ago | (#38591924)

Performance is still pretty bad, especially when deleting many small files. It can take minutes with BTRFS, while EXT4 does it almost instantly in comparison.

Re:Btrfs (5, Informative)

francium de neobie (590783) | more than 2 years ago | (#38591794)

There's no fsck [kernel.org].. So unless you're 100% sure your Linux machine never crashes and your power supply is never interrupted - don't.

Re:Btrfs (3, Interesting)

Anonymous Coward | more than 2 years ago | (#38591844)

Even without any crashes or power fails, I've managed to corrupt BTRFS in testing, with just a defrag (as recently as 3.2-RC6). I wouldn't look at BTRFS for a while, at least until it's no longer marked experimental. By all means test away, but don't assume you'll be able to get to any data you put in it.

Re:Btrfs (1, Insightful)

dnaumov (453672) | more than 2 years ago | (#38592128)

There's no fsck [kernel.org].. So unless you're 100% sure your Linux machine never crashes and your power supply is never interrupted - don't.

If this is the case, whats the fucking point really? BTRFS was heralded are the replacement for ZFS, but you are seriously telling me that after all this time, you can still lose a large amount of data and end up with a corrupt filesystem after such a trivial thing as a powerloss? Really? It seems like I am still stuck with FreeBSD and Solaris11/OpenIndiana if I want to use a decent filesystem, because even Windows hasn't had such issues in over a goddamn decade.

Re:Btrfs (4, Informative)

0123456 (636235) | more than 2 years ago | (#38592268)

If this is the case, whats the fucking point really? BTRFS was heralded are the replacement for ZFS, but you are seriously telling me that after all this time, you can still lose a large amount of data and end up with a corrupt filesystem after such a trivial thing as a powerloss? Really?

BTRFS has only been around for a short time and I don't believe any OS uses it as the default filesystem yet. And you're surprised that it still has problems?

And I don't remember anyone claiming that BTRFS would replace ZFS, merely that it would eventually have many of the same capabilities that ZFS has.

Re:Btrfs (2, Insightful)

icebraining (1313345) | more than 2 years ago | (#38592272)

even Windows hasn't had such issues in over a goddamn decade.

Windows is not a filesystem. And that's only relevant if NTFS has the same features as ZFS: Ext doesn't have the same issues either.

Re:Btrfs (2)

adolf (21054) | more than 2 years ago | (#38592620)

Windows is not a filesystem.

Windows may not be a filesystem, but it only ships with one sane choice of general-purpose filesystem, and that choice is NTFS. Therefore, Windows == NTFS for the purpose of a discussion in the context of filesystems. Not literally, but plainly for all intents and purposes.

(Counterarguments about Windows also shipping with crappy filesystem(s) needn't apply, since Linux/*BSD ships with those too. And HPFS, the only other then-viable choice from IBM/MSFT, and perhaps the only one that Linux and Windows and OS/2 all supported properly at the same time, got killed a long long time ago.)

(Disclaimer: This is does not represent my opinion on anything. It simply is a representation of how things are.)

Re:Btrfs (1, Insightful)

boxxertrumps (1124859) | more than 2 years ago | (#38592682)

Windows may not be a filesystem, but it only ships with one sane choice of general-purpose filesystem, and that choice is NTFS.

In your opinion it's a sane FS.

... does not represent my opinion on anything. It simply is.. ..how things are.

Wait, what?

NTFS and windows are a pain in _my_ ass. That's an opinion.

Re:Btrfs (1)

Anonymous Coward | more than 2 years ago | (#38592792)

not only in yours, have fun creating a few thousand small files in one directory on ntfs. And also have fun with the invisible incompatibilities (xp_ntfs vs 7_ntfs)

Re:Btrfs (0)

Anonymous Coward | more than 2 years ago | (#38592720)

except you're wrong. NTFS is not general purpse, you're probably thinking of FAT32/vfat which at least is more ambigious - as it applies to more than harddrives, but still far from general purpse.

Re:Btrfs (5, Insightful)

tetromino (807969) | more than 2 years ago | (#38592338)

If this is the case, whats the fucking point really?

The fucking point is to encourage beta-testers. Bleeding-edge users who know what they are doing and don't care about data loss are being offered the chance to test a new and interesting filesystem and (ab)use it in ways that upstream developers had not thought of, hopefully uncovering major bugs before the thing will get marked as feature-complete and enabled by default for new installs by major distros.

Re:Btrfs (5, Insightful)

waveclaw (43274) | more than 2 years ago | (#38592828)

Bleeding-edge users who know what they are doing and don't care about data loss are being offered the chance to test a new and interesting filesystem

Amen.

fsck's only job is to make that junk that was a filesystem look something like a filesystem again. Nothing in there about making it look like the particular filesystem you used to have. fsck is not backups. fsck will not (necessarily) get your data back. fsck may eat kittens on a bad day. What fsck does hand back to you should not be trusted and should certainly be verified.

If you think that pulling most of what was /home, /var, /srv or /opt out of lost+found is fun, just remember that corrupted directory and filenames get named after their inodes. Nothing like trying to figure out of 1234567 or 1234568 was the start of the quarterly financials report.

If you are relying upon a fsck to get your data back after a power outage, you have more faith in your filesystem than you should. It's a nice validation tool, with the caveat that a False Negative means you go back to using a damaged filesystem for more fun later, rather than now.

BUT if you have backups, please do test. Having talked to the BTRFS team directly at LINUXCON, Mr. Chacon and folks are pretty cool about getting feedback. And you can do nifty things like snapshots for backups on RAID10 or thin disks on virtual machines which don't inflate during formatting.

For many filesystems, failing a fcsk means reaching for the format tools and the last (verified) backup. You are backing up everything, right?

Re:Btrfs (1)

taricorp (987706) | more than 2 years ago | (#38592186)

$ btrfsck
usage: btrfsck dev
Btrfs Btrfs v0.19

It's there if your userland is new enough, but I don't know how much it actually does.

I've been running btrfs on my workstation for a while now and have not had any issues with its stability. I still wouldn't run it without regular backups, though.

Re:Btrfs (1)

Anonymous Coward | more than 2 years ago | (#38592960)

It's a copy on write filesystem, so like ZFS, it really can't become corrupt. You might lose a file if that write hasn't been commited yet and your application might be out of whack, but the filesystem itself will be clean. This is why one has battery backups and your app being screwed up isn't a filesystem issue at this point.

Re:Btrfs (1)

nzac (1822298) | more than 2 years ago | (#38592172)

I have herd a number of recommend that for a personal desktop you could use it for non user files (ext for home and boot and btrfs for ever thing else).

The idea being that if something goes wrong you can just reinstall (30 min for me if I cache my updates).

You just have weigh up the risk and minimize the damage. Unless you are using it with something like snapper (fs snapshot and roll back) or a stopwatch you will never know the difference unless it gets corrupted.

Re:Btrfs (3, Interesting)

mattbee (17533) | more than 2 years ago | (#38592176)

btrfs is tanatlizing for VMs because of the copy-on-write file behaviour (i.e. "cp --reflink a b" creates b instantly regardless of the size of a), but http://lists.fedoraproject.org/pipermail/devel/2011-July/154251.html [fedoraproject.org] is still an issue, as far as I'm aware. So storing VMs, where you access them with O_SYNC, just gets slower over time until it's unusable. I'm not quite brave enough to suggest that any of our customers use it, at least until there's a working fsck.

But can it run Crysis? (-1)

Anonymous Coward | more than 2 years ago | (#38591740)

First

Re:But can it run Crysis? (-1)

Anonymous Coward | more than 2 years ago | (#38591814)

Fail

Popcorn loaded, commence fanatical BS... (4, Insightful)

inflex (123318) | more than 2 years ago | (#38591754)

Waiting to see the usual fanatical wars over filesystems... people calling for the death of the EXT3/4 system.

Personally the whole fanatical thing seems a bit silly - who'd have ever thought that people would lynch each other over having different options for different purposes/tasks, the very core of the whole idea of what we do and strive for. I'm fine with ext4, thanks :)

Re:Popcorn loaded, commence fanatical BS... (2, Interesting)

RobbieThe1st (1977364) | more than 2 years ago | (#38591836)

I still say we should lynch EXT3/4(even though I use it) due to it's complete /inability/ to undelete files.
Because, as we all know, people /never/ manage to accidentally delete files and /always/ have recent backups handy.

Re:Popcorn loaded, commence fanatical BS... (0, Troll)

epyT-R (613989) | more than 2 years ago | (#38591874)

adapting the machine to convenience should not be the same as adapting it to stupidity. a race to the bottom doesn't help anyone. backup is a remedial skill that we should all be doing.

Re:Popcorn loaded, commence fanatical BS... (2)

ILongForDarkness (1134931) | more than 2 years ago | (#38592830)

And when your backup hasn't run yet what than? I've worked on 100+ TB of live data several PB of capacity systems. Sometimes users are dumping 10Gbps data to disk for days at a time. Than someone deletes something and woops the tape hasn't archived it yet. Admittedly a "recycle bin" probably wouldn't handle TBs of data but still scale the problem done and it is still a real issue. Downloaded a pdf and accidentally deleted it rather than the paper you just read. Oh crap and can't remember where it came from because you've clicked on 50 links between than and very useful links like http://something.com/alkshftfhY [something.com]^asdlfkhalnlknlkrehwo aren't very helpful in finding out what the docs were. Seems trivial but anything that a user can see on a nearly daily basis isn't trivial it is a every day net positive feature to have.

Re:Popcorn loaded, commence fanatical BS... (1)

inflex (123318) | more than 2 years ago | (#38591906)

People generally only make that mistake once or twice before they become a bit more clued up and invest in a backup option, even on OS's that provide undelete (Windows). Agreeably it doesn't save you when you create and then lose a file between the backup times.

It might be a nice option to have, so long as it doesn't inhibit/hinder the existing system. I think an entirely different filesystem would be a better option, something with inbuilt versioning/history.

Re:Popcorn loaded, commence fanatical BS... (4, Insightful)

DarkOx (621550) | more than 2 years ago | (#38591928)

Then what you should do is change you shell so rm is a functIon that moves stuff to the "trash" rather than compromise the on disk format of the file system so an operation "unlink" which is supposed to be destructive can be undone. Solve the problem in the correct place.

Re:Popcorn loaded, commence fanatical BS... (2)

MightyYar (622222) | more than 2 years ago | (#38592252)

Agreed. I alias rm to 'rm -i' so that I have to at least type -f if I really mean it :)

rm -i (5, Insightful)

steveha (103154) | more than 2 years ago | (#38592998)

I used to alias "rm" as "rm -i".

Then, one day, I was using someone else's computer. I used "rm" with the expectation that it would prompt me, but this person never bothered to set it up that way, and I had the fearful experience of worrying whether it was deleting too much. I hadn't been too careless that time, but it got me thinking. It's dangerous to use "rm" when I really mean "rm -i"; habits are strong things.

So I made a change that I still use. I now alias "r" as "rm -i". "r" by itself does not have default behavior on most computers. Now if I absent-mindedly type "r *.txt" on someone else's computer, I get "r: command not found" and I edit the command to say "rm -i".

I suppose I should have used "rmi" or something like that, just in case I am a guest somewhere that "r" was aliased to something crazy. In practice, it hasn't been a problem. I use more aliases than most people seem to; they seem to be content with the defaults. I seem to be the only one I know who likes one-letter aliases.

Hmm, I guess I might accidentally run the R statistics package someday?

steveha

Re:Popcorn loaded, commence fanatical BS... (1)

Anonymous Coward | more than 2 years ago | (#38591968)

...undelete files.

Not to mention I can't unwrite the file once I'm done with it!

Re:Popcorn loaded, commence fanatical BS... (4, Funny)

MichaelSmith (789609) | more than 2 years ago | (#38592112)

I want a computer which lets me unsee certain image files.

Re:Popcorn loaded, commence fanatical BS... (1)

Anonymous Coward | more than 2 years ago | (#38592156)

...and I want to unread comments sometimes.

In 2011 Linux let hackers/crackers see it ALL. (-1)

Anonymous Coward | more than 2 years ago | (#38593096)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Re:Popcorn loaded, commence fanatical BS... (1)

Anonymous Coward | more than 2 years ago | (#38592028)

The filesystem is the wrong place to solve that problem, though.

kioclient move myfile trash:/

If you want, wrap that up and call it rm. If you really want, replace the unlink system call with something that does that.

Re:Popcorn loaded, commence fanatical BS... (1)

mcavic (2007672) | more than 2 years ago | (#38592248)

The filesystem needn't be burdened with it. But if was a kernel function, you'd have the option of saving clobbered files as well as deleted files. You could also design a friendly retrieval system, without requiring a versioning filesystem, per se.

Re:Popcorn loaded, commence fanatical BS... (1)

Wintervenom (1468867) | more than 2 years ago | (#38592058)

One, back up.
Two, see one.
Three, try extundelete <http://extundelete.sourceforge.net/>.

Re:Popcorn loaded, commence fanatical BS... (1)

RobbieThe1st (1977364) | more than 2 years ago | (#38592300)

Three, only works with EXT2. Which it works perfectly well on. But nothing later.
Y'know, tossing a copy of the deleted inode entries(in a different format) somewhere else on disk, to be used only when space runs low would solve all of the many, many topics out there about people losing data due to a mistake etc. Perhaps an option that could easily be disabled for the tech-savvy(See: the number of people who use the stock desktop on, e.g. ubuntu, even when a seperate desktop is available easily via apt-get)...
But everyone seems to think that people will back things up, which doesn't happen until said people lose a lot of data.

Re:Popcorn loaded, commence fanatical BS... (2, Informative)

Anonymous Coward | more than 2 years ago | (#38592704)

One workaround we did on our server over a decade ago was to hardlink basically everything to /shadow

Entries in /shadow went through periodic timed deletes, but that avoided irreparable stupidity.

Re:Popcorn loaded, commence fanatical BS... (-1)

hedwards (940851) | more than 2 years ago | (#38592852)

Not really, if we're going to lynch filesystems we should be lynching EXT3/4 for being so bloodly unreliable. I've never lost as much data as I have using those filesystems. In fact the only saving grace was that the data loss occurred so rapidly, quickly and thoroughly that I didn't have the chance to create any files that I missed when they were corrupted beyond recognition.

It looks like they finally bothered to provide an fsck for EXT4, which took way too long, considering that the install program allows you to choose it as a filesystem for installing to.

Re:Popcorn loaded, commence fanatical BS... (4, Funny)

martin-boundary (547041) | more than 2 years ago | (#38591860)

Personally the whole fanatical thing seems a bit silly

That's not silly! There are two reasons for silliness. Surprise and fear. Fear and surprise... and ruthless efficiency. There are *three* reasons for silliness, these being fear, surprise, and ruthless efficiency... and an almost fanatical devotion to the Pope. *Amongst* the reasons for silliness are such elements as fear, surprise, ruthless efficiency and ... Ok, you're right, fanatical is silly after all.

Re:Popcorn loaded, commence fanatical BS... (1)

MichaelSmith (789609) | more than 2 years ago | (#38591900)

I tried btrfs when I recently installed ubuntu on a new netbook. It was taking 15 minutes to fsck the disk on startup. This file system seems a long way from being used by default.

Re:Popcorn loaded, commence fanatical BS... (2)

msk (6205) | more than 2 years ago | (#38592088)

Where'd you get fsck for btrfs?

Re:Popcorn loaded, commence fanatical BS... (1)

MichaelSmith (789609) | more than 2 years ago | (#38592212)

Thats a good question. I thought it was running fsck because it took forever to mount on startup. But maybe the mount was slow for other reasons.

Good stuff! (5, Funny)

ickleberry (864871) | more than 2 years ago | (#38591792)

I never did like the number "3.1" for some reason

Re:Good stuff! (0)

Anonymous Coward | more than 2 years ago | (#38591816)

Sounds like somebody's got a case of the "Windows".

Re:Good stuff! (5, Funny)

Nursie (632944) | more than 2 years ago | (#38592016)

Maybe it's because we all know what comes next - 3.11, Linux for workgroups and then the dreaded Linux 95!

Linux "fine security record" (lol, NOT) in 2011 (-1)

Anonymous Coward | more than 2 years ago | (#38593066)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Re:Good stuff! (1)

Psicopatico (1005433) | more than 2 years ago | (#38592082)

I never did like the number "3.1" for some reason

Because you know odd minor version numbers are experimental?

Linux "fine security record" (lol, NOT) in 2011 (-1)

Anonymous Coward | more than 2 years ago | (#38593078)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b"

Re:Linux "fine security record" (lol, NOT) in 2011 (-1)

Anonymous Coward | more than 2 years ago | (#38593118)

Peter, you're doing it again.

Folks, google Alexander Peter Kowalski for some seriously fucked up shit.

Wow (2)

wbr1 (2538558) | more than 2 years ago | (#38591880)

The first kernel I compiled was 1.2.10, I know there are people who have here who have been it longer than I, so this is not an ego-trip. I just feel old. I need doctor Carol Marcus to make me .... "Feel young, as when the earth was new."

Re:Wow (0)

Anonymous Coward | more than 2 years ago | (#38592218)

your memory too.. the quote is
"..feel young, as when the world was new"

I call bullshit. (0, Funny)

Anonymous Coward | more than 2 years ago | (#38591888)

It's not released unless I can get it on my box now with apt-get.

Version number MADNESS (1, Funny)

RMingin (985478) | more than 2 years ago | (#38591936)

Wake me when we get to 7.1. At this rate it ought to be sometime this fall.

Re:Version number MADNESS (1)

Anonymous Coward | more than 2 years ago | (#38592050)

It would be next week if they let Mozilla number them.

Re:Version number MADNESS (1, Interesting)

Anonymous Coward | more than 2 years ago | (#38592142)

Wake me when we get to 7.1. At this rate it ought to be sometime this fall.

Whats your problem? Linus chose to drop the extra number because it had become meaningless with the current development model of the kernel, and I have to agree with him that saying '2.6.34.3" was annoying in conversations; its much easier to just say 'oh im on kernel 3.{0,1,2} " Its quick, simple, rolls off the tongue much more easily. Also, major version numbers are still used to denote an API/ABI break. So unless you're telling me that Linus is going to accept patches that break the API/ABI on FOUR seperate occasions in the span of 7 months or so, the exaggeration is even more over the top than a normal expression

-- Reaper924

Re:Version number MADNESS (1)

Anonymous Coward | more than 2 years ago | (#38592580)

Yea, could've been worse, he could've just dropped the 2 off the front and started calling it 6.34 or whatever....pretty sure somebody did that, was it Java? Don't remember.

Re:Version number MADNESS (0)

Anonymous Coward | more than 2 years ago | (#38592762)

Solaris. 2.5 then Solaris 6 if I remember correctly. The on-system versions are still done as 2.x X being Solaris X.

Just spent a weekend wiping some old sun boxes to install linux on :D

Re:Version number MADNESS (1)

rubycodez (864176) | more than 2 years ago | (#38592988)

Actually, it was version 2.7 of Solaris that was renamed as Solaris 7 which also is SunOS 5.7 (e.g. in man pages). The current Solaris 11 is really Solaris 2.11 is also SunOS 5.11.

http://en.wikipedia.org/wiki/Solaris_(operating_system)#Version_history

Everybody Clear?

Haha Linux such loosers! (-1)

Anonymous Coward | more than 2 years ago | (#38592024)

Hell Windows just reached version 2000 over a DECADE ago. And Linux? A paltry version 3? What loosers!

Re:Haha Linux such loosers! (1)

unixisc (2429386) | more than 2 years ago | (#38592862)

But now Windows is back down to 7, next year maybe 8. And no, it doesn't mean Windows 2007, 2008....

Forgive my ignorance (1)

mark_reh (2015546) | more than 2 years ago | (#38592080)

but I'm an amateur at this stuff. I look at the page that lists the improvements and don't see anything that addresses the power regression that affects battery charge life in laptops. Or am I wrong (please...)?

Re:Forgive my ignorance (2, Interesting)

Microlith (54737) | more than 2 years ago | (#38592116)

That was Ubuntu, as I recall, and not necessarily the greater kernel community. I'm sure they'd rather play it safe and have a slightly more power hungry but stable system than risk crashing people's systems because OEMs are incompetent and can't report their shit properly.

Re:Forgive my ignorance (2)

mark_reh (2015546) | more than 2 years ago | (#38592840)

No, as I understand it, it is actually in the kernel. I think the problem was found in Ubuntu simply because it's the most popular (?) linux distro.

Enlightening you to "Linux FINE security" in 2011 (-1)

Anonymous Coward | more than 2 years ago | (#38593058)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Re:Forgive my ignorance (1)

Anonymous Coward | more than 2 years ago | (#38592146)

Wasn't that fixed earlier this year?

Check out the slashdot stories, hold on, I'll do it. http://linux.slashdot.org/story/11/11/11/2036245/linux-kernel-power-bug-is-fixed

There you go. Problem solved from ages ago.

Versioning (1)

mschoolbus (627182) | more than 2 years ago | (#38592126)

Linux should increase versions like Firefox did in order to be as good as 7.

Looks like a really good release (1)

Shaman (1148) | more than 2 years ago | (#38592132)

This looks to be a really strong, likely to be long-supported, kernel. Providing that the Googleification of the TCP stack doesn't hurt local 1-10Gbps performance, that is. Have a care if you do your own kernel compiles... the whole Ethernet driver subsystem has been merged together.

ext4 blocks? (1)

hcs_$reboot (1536101) | more than 2 years ago | (#38592438)

Engineers kept using ext3 (or reiserfs...) for a while because ext4 was "too new".
Now that it's stable and used, is it safe to extend it with such a powerful "block" option, and risk a potential regression?

Re:ext4 blocks? (1)

hedwards (940851) | more than 2 years ago | (#38592872)

IIRC weren't they not using ext4 because it was missing some crucial features like fsck support?

3.2 = "hacker special build" (LMAO) (-1)

Anonymous Coward | more than 2 years ago | (#38592606)

KERNEL.ORG COMPROMISED:

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

Yes kids, you too can have Linux that "ultra-secure" OS that got:

1.) Compromised in 2011 on 5 CA SSL servers (important for banking, shopping, ecommerce online)

2.) Went down in a security firm (no excuse saying noobz set it up) stratfor, on the server level (and served up exploits galore and is the favored target of spammers/phishers ala LAMP too)

3.) Gets knocked around & exploited on the end-user non-tech level on ANDROID (a Linux variant) like there's NO TOMORROW with exploits galore!

( & then the above too? Please... lol!)

LOL - After 2011? Heck, it must be the *NIX dating problem (lol, 2038) or something because 2011 looked like Linux's 2012, lol, for security and exploits on all fronts, because it can't hide behind it's 'security by obscurity' anymore because of ANDROID. Nobody used it at the desktop home user level really (1.19% marketshare all-time high, lol), so it wasn't worth targetting like the MOST USED OS THERE IS, WINDOWS NT-BASED OS! However, ANDROID changed that & shows Linux IS exploitable as hell (kernel level bugs were found, permissions issues, remote shelling, & FAR more like millions stolen).

So... lol, hey:

Man, you just KNOW all that "FUD" about "Linux=Secure" for YEARS here on /., was just purest bullshit.

This latest 3.2 kernel will allow root access to all "l33t HaX0rz", lol

(I mean because if it's going to keep on improving on the security front (not) the way it has above, it might as well do that too (lol, probably does, see 1st link above)).

Re:3.2 = "hacker special build" (LMAO) (-1)

Anonymous Coward | more than 2 years ago | (#38592796)

Your brackets in brackets causes parse errors in my head.

Re:3.2 = "hacker special build" (LMAO) (-1)

Anonymous Coward | more than 2 years ago | (#38592920)

You use Linux? You probably get confused tying your shoes too! All the security issues in Linux he posted. Are they caused by parse errors too?

Hot news flash (-1)

Anonymous Coward | more than 2 years ago | (#38592846)

Linux is still trash and will NEVER be ready for the average user.

Re:Hot news flash (0)

Anonymous Coward | more than 2 years ago | (#38592892)

My wife uses it fine.

She does the things the average user does... E-mail, web browsing, Facebook, Chat, etc. etc.

Yes I did install it (Gentoo Linux), but have you seen the simple GUI installers of Ubuntu and friends? I feel confident my mother could figure that out.

Re:Hot news flash (-1)

Anonymous Coward | more than 2 years ago | (#38593132)

She only uses Linux because it runs her vibrator, lol!

Linux "fine security record" (lol, not) in 2011 (-1)

Anonymous Coward | more than 2 years ago | (#38593040)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Digital Signal Processor processor (0)

Anonymous Coward | more than 2 years ago | (#38592886)

C'mon guis, mind yer 'ritin arriddy, y'heer naow.

Linux "fine security trackrecord" in 2011 (lol) (-1)

Anonymous Coward | more than 2 years ago | (#38592932)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org], & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/bLINUX

Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...