On Mon, 2010-09-20 at 07:09 +0200, Nadav Har'El wrote:
> On Mon, Sep 20, 2010, Omer Zak wrote about "Does anyone know whether the
> following can be trusted?":
> > There is an exploit of 64-bit Linux kernel, which leaves behind a
> > backdoor usable even after the kernel has been patched.
> >
> >
On Mon, Sep 20, 2010, Omer Zak wrote about "Does anyone know whether the
following can be trusted?":
> There is an exploit of 64-bit Linux kernel, which leaves behind a
> backdoor usable even after the kernel has been patched.
>
> To check whether your PC is infected, the diagnose-2010-3081 tool
There is an exploit of 64-bit Linux kernel, which leaves behind a
backdoor usable even after the kernel has been patched.
To check whether your PC is infected, the diagnose-2010-3081 tool can be
used (see https://www.ksplice.com/uptrack/cve-2010-3081.ssi.xhtml for
links to binary and to source).
Hi all,
following on Sawyer's talk about version control, I've been thinking of doing
another talk about a different software best practice: automated software
testing:
http://en.wikipedia.org/wiki/Test_automation
Since I'm a big practitioner and advocate of writing automated tests and test-
d