From Fedora Project Wiki

  • ...n subjects have with objects. This means that if the Apache HTTP server is compromised, the attacker only has access to files labeled with the correct type. Each .... If a Web server is running in a protected domain, and that Web server is compromised, an attacker can only access files that the Web server has access to. SELin
    5 KB (766 words) - 00:47, 28 February 2009
  • ...e accompanied by a PGP signature. It is possible for source tarballs to be compromised at any point in time, from the download site or within the Fedora lookaside ...gnature is checked at the beginning of the %prep step to make sure that no compromised code runs as part of the build process. Otherwise if packages run for examp
    6 KB (949 words) - 06:34, 22 August 2022
  • ...gs are conveyed to the translators, thus the quality of translation is not compromised.
    2 KB (250 words) - 21:45, 31 December 2018
  • ...machine is seeing little use, we would likely not notice that the box was compromised for a long period of time.
    8 KB (1,411 words) - 23:08, 7 December 2011
  • ...hat source code. This allows for improved assurance that the build is not compromised.
    3 KB (437 words) - 00:34, 21 January 2016
  • ...n subjects have with objects. This means that if the Apache HTTP server is compromised, the attacker only has access to files labeled with the correct type. Each .... If a Web server is running in a protected domain, and that Web server is compromised, an attacker can only access files that the Web server has access to. SELin
    20 KB (3,079 words) - 00:47, 28 February 2009
  • ...en configured to have access to. For example, if the Apache HTTP Server is compromised, an attacker is unable to read objects in user home directories, unless a s
    13 KB (2,045 words) - 00:48, 28 February 2009
  • property (file_contexts), and I used an example of a compromised FTP server to show that is will only do what it supposed to do, even compromised.
    10 KB (1,514 words) - 20:55, 9 April 2010
  • ...that have already been compromised by crackers, or infected with a virus. Compromised systems constantly check thousands of Internet addresses for active systems ...t a successful attack may cause a service to fail or become compromised. A compromised service may copy or modify databases and files that the service is permitte
    17 KB (2,639 words) - 00:50, 27 February 2016
  • ...event that Fedora Rel-Eng needs to restore a release from scratch (from a compromised host, or major data loss event) the old process will still need to exist fo
    4 KB (658 words) - 14:24, 6 September 2016
  • ...event that Fedora Rel-Eng needs to restore a release from scratch (from a compromised host, or major data loss event) the old process will still need to exist fo
    4 KB (682 words) - 13:56, 10 December 2015
  • indeed been compromised. credentials were compromised externally, and that the Fedora Infrastructure was
    22 KB (3,180 words) - 12:50, 28 January 2011
  • ...fig to fix common code idioms used by autoconf generated scripts which are compromised by the additional optimization enabled by LTO. Minor updates to various pa ...t-rpm-config maintainers. Packages which call configure directly and have compromised tests will need a one line change to their .spec files to fix their configu
    15 KB (2,469 words) - 12:31, 13 January 2021
  • directory, and if the cgi script has a bug and can become compromised,
    9 KB (1,549 words) - 04:52, 9 June 2008
  • | style="color: #407a40" | Finally Xen has already been compromised | style="color: #407a40" | Any one of these can get compromised and then attack the hypervisor.
    62 KB (7,138 words) - 09:08, 18 September 2016
  • ...also increased use of SELinux to protect the host operating system from a compromised or malicious QEMU/KVM process. The latter still did not provide any protection between guests, so one compromised QEMU process would still potentially be able to compromise another on the s
    15 KB (2,498 words) - 03:34, 5 June 2009
  • SELinux to protect the host operating system from a compromised or compromised QEMU process would still potentially be able to compromise
    15 KB (2,457 words) - 14:48, 15 May 2009
  • ...attacker might be able to modify system files (say, replace /bin/ls with a compromised version) and you want to protect against that. For example, consider an app ...l see a validation failure and the syscall will be blocked, preventing the compromised code from being executed.
    17 KB (2,900 words) - 14:18, 14 February 2022
  • ...those vulnerable to attack or which could devastate a system if broken or compromised. The rest of the system runs exactly as it would under standard Linux DAC s
    8 KB (1,319 words) - 00:46, 28 February 2009
  • ...u withdraw it from public use. ''You should only have to do this if it is compromised or lost, or you forget the passphrase.'' ...hrough a server helps other users to quickly become aware the key has been compromised.
    16 KB (2,697 words) - 18:12, 5 April 2020
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)