资讯

Secondly, we design an anomaly detection algorithm, which is based on hashchain technology and combines the user privacy metadata stored on the blockchain to complete the verification process, ...
Linux machine-id: A machine identifier (ID) that is used to uniquely identify a computer on Linux systems. Unfortunately this parameter is subject to user modification and no reliable solution for ...
Zhou, P., Wu, Y. and Zhao, C. (2022) Identify Linux Security Vulnerability Fix Patches Automatically. Journal of Computer Research and Development, 59, 197-208.
A couple of newly discovered Linux vulnerabilities let attacks steal core dumps of legitimate process to steal password hashes.
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Image courtesy of Google News Two critical local information-disclosure vulnerabilities have been ...
Linux vulnerabilities CVE-2025-5054 and CVE-2025-4598 let local attackers extract sensitive data via SUID core dumps.
The Linux kernel stores high-usage data objects such as pages, buffers, and inodes in data structures known as hash tables. In this report we analyze existing static hash tables to study the benefits ...
Microsoft Security Copilot, an artificial intelligence (AI) cybersecurity tool, was used to discover several previously unknown vulnerabilities in open-source bootloaders.
This guide explains how to recover lost files in Linux using a live USB and recovery tools such as TestDisk, PhotoRec, and extundelete.
Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094.
Kali Linux 2023.4, the fourth and final version of 2023, is now available for download, with fifteen new tools and the GNOME 45 desktop environment.