-
The root user, by the by, is the system administrator account, something we'll also discuss in more detail later.
ENGADGET: A guide to Slackware and Arch Linux: getting your hands dirty with Linux
-
Not to be confused with the root user account you'll see later.
ENGADGET: A guide to Slackware and Arch Linux: getting your hands dirty with Linux
-
As a security-tightening measure on individual Linux boxes, Ozancin recommends reviewing security-sensitive files, especially those installed set-UID or set-GID to run with the root user's authority (or equivalent).
CNN: Analysis: Linux security
-
Participants also discussed new-wave techniques to stop new malware from taking root, including studying patterns of user and file activity to find suspicious behavior and broader use of encryption.
WSJ: Tech Companies Struggle to Keep Hackers at Bay
-
While fiddling with his Galaxy S III, XDA user Alephzain discovered a way to obtain root without flashing with Odin.
ENGADGET: Security exploit opens Samsung Galaxy S III, Note II to attack, could let apps from Google Play write to Kernel
-
Amid the XDA community's ongoing quest to root every Android handset it comes across, one forum user appears to have found a serious exploit that affects certain Exynos devices.
ENGADGET: Security exploit opens Samsung Galaxy S III, Note II to attack, could let apps from Google Play write to Kernel