4
Red Hat: 2010:0126-01: kvm: Important Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated kvm packages that fix two security issues and two bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red [More...] (Security)

3
sudo vulnerabilitiesview story

http://www.ubuntugeek.com – A security issue affects the following Ubuntu releases: (HowTos)

4
Openistas Squish Security Bugs Twice as Fastview story

http://www.linux.com – Open source software has comparable security, faster bug fixing, and fewer potential backdoors than commercial software, according to a study on software application vulnerabilities by security firm VeraCode.…... (Software)

5
Spat over PHP Suhosin patchview story

http://rss.feedsportal.com – Suhosin, a security extension for PHP, can occasionally cause crashes. A patch released by the Debian maintainers resolves this problem, but does so at the expense of security. (General)

4
Call for papers for Month of PHP Securityview story

http://rss.feedsportal.com – During the month, new security articles relating to the PHP scripting language will be published daily. (General)

4
Symantec’s Norton 360 Version 4.0 – Reviewview story

http://digitizor.com – About a week ago, we told you about the launch of Symantec’s flagship product, Norton 360 version 4.0. (HowTos)

6
Deconstructing Nautilus and rebuilding it better (Nautilus + Zeitgeist)view story

http://www.ubuntugeek.com – (HowTos)

4
How to Add and Remove User Account in Linux using Terminalview story

http://gamblis.com – Here is the tutorial on how to add and remove user accounts on Linux system. This tutorial is applied to all Linux distributions, I grabbed from other source; Most of us need to work with creating/managing user accounts on a regular basis. System Administrators have to deal with this stuff on a regular basis. (Distributions)

6
News: Malicious Software: Hiding the Honeypotsview story

http://www.raiden.net – Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scien ... (Distributions)

3
Ubuntu One Music Store team answers your questions about the serviceview story

http://digitizor.com – As you may already be aware by now, Ubuntu 10.04 Lucid Lynx is coming with a music store called the Ubuntu One Music Store. This is a very new and exciting thing from Canoncal and understandably people have a lot of questions about this new service. So, the Ubuntu One Music Store team have come out with a FAQ about the store. (HowTos)