I recently offered some security tips aimed at new system administrators. And hey, the home users among you should take note, after all, you’re the administrator of your home system! One of the tips was “Don’t run as root.” Today I would like to expand on that a bit. First, we’ll take a look at why you should limit the use of your super powers. Then we’ll look at the best ways to use su and sudo to help you limit your risks.
FOSS Force

Sarah Sharp, an embedded software architect at Intel, and Kesha Shah, a student at Dhirubhai Ambani Institute of Information and Communication Technology, were named the winners of Red Hat’s first Women in Open Source Awards at the Red Hat Summit in Boston on Tuesday.
The Women in Open Source Awards recognize women in two categories – Community and Academic – who make important contributions to open source projects and communities, or who promote open source methodologies.





Apple? So long as it continues to be an overpriced walled garden, it’s not likely to pose much of a threat. It’ll always be held in disdain by free tech folks, but always in the number two position because it’s easily ignored.
Red Hat, Samsung Team Up: While there has been a lot of oooh-ing and ahhh-ing over what’s been coming out of the 
Ironically, this side door is intended to be a security door for third party add-ons that every Windows machine needs to keep it safe from cracker hackers — if that’s indeed possible. And this security tool is usually more trusted by Microsoft system admins, especially those outside the U.S., than Windows itself.
The only sad part of the story, at least so far, is that the United States has stubbornly dug in her heels. She has chosen to pay homage to the Microsofts and the Apples in our nation. We remain as one of the only nations in the world that openly shuns FOSS in the enterprise. We not only shun it, we work directly against it in the halls of our Senate. That’s due to one simple thing.

I participate in a group of professional penetration testers (the nice folks who help you test your security as if they were the bad guys) called