开放源码项目需要修复漏洞

2013/11/04

Computer security is largely based on the software you are using. Also, some people prefer to use open source, because it is not only free from the exchange will get frequent updates, users who like to use them, and operating systems such as Linux is a popular for so many years. Nevertheless, the operating system is very safe, security experts believe that other open source projects less secure, personal interests and create software for the user so that they are easily accessible and can be downloaded at any time, without having to pay any fees. But at the same kind of software application is not everyone in the world, no one doubts will provide updates, which will lead to security vulnerabilities, hackers case choose to attack this type of software user base, they would easily take advantage of this loophole in minutes inject malware or other malicious code.

According to statistics, select Open source software is authentic. Some of the popular, such as Moodle, Zabiiz, ISP Config and vTiger, all of these based on open source code, and communication for the update. They can be used to achieve the ultimate, and very helpful to users. But the problem is that they would threaten a certain level of computer security. No suitable protective dedicated security team provided millions of people are vulnerable and exposed to attack. Nearly 4 million downloads were recorded as Moodle enough to show how popular it is among users, and thus is widely used. Past the cautious use of open source products, but as people with a more open attitude to use these products, they prefer to use a lot of time.

Data show that in these documents the popular open source project, when users complain about the use of only two vulnerabilities and security breaches. Even with a large group of people still use it, but all of them less active. Such behavior threaten computer security , they are very fragile. Your computer will change. This affects not only the software and its related applications, and the entire infrastructure. File storage and elsewhere may be damaged or infected with a virus trying to invade your computer through a security hole open source.

Tags:

Write a comment

Name
Comment