You should never have to work with the root user account on Linux, especially on a desktop installation. There can be occasions when you need to use root on a server. If you must use root, do so with ...
Three vulnerabilities found in the iSCSI subsystem of the Linux kernel could allow local attackers with basic user privileges to gain root privileges on unpatched Linux systems. These security bugs ...
There was a time when real system administrators just logged into Unix systems as root. But as we all know — with great power comes great responsibility. It’s too easy to do terrible things when you ...
Back in the early days of Linux, things were exponentially more complicated. The distributions were far less mature and required a particular system account to get things done. That account was root - ...
If Marvin the Martian makes it onto your computer and does privilege escalation to take it over, we might now know just how they did it. A new Linux local privilege escalation vulnerability, dubbed ...
Attackers can now gain root privileges on millions of Linux systems — by exploiting an easy-to-exploit, newly discovered buffer overflow flaw in a common library used on most major distributions of ...
Vulnerabilities recently discovered by Microsoft make it easy for people with a toehold on many Linux desktop systems to quickly gain root system rights— the latest elevation of privileges flaw to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results