Debian Planet

Welcome to Debian Planet


Apt-get into it.
Main Menu

  • Home

  • Topics

  • Web Links

  • Your Account

  • Submit News

  • Stats

  • Top 10

  • Debian

    These are important Debian sites one should not be without!

  • Official Debian site

  • Package search

  • Mailing list archives

  • Bug reports

  • Debian on CD

  • Unofficial woody CD ISOs

  • Unofficial APT sources

  • Developers’ Corner

    Other great Debian news sources:

  • Debian Weekly News

  • Kernel Cousin Debian

    (Debian mailing lists digested)
  • Community Groups

    Need help? You’re not alone on this planet.

  • debianHELP

    (User support site)

  • Debian International



  • EsDebian


  • DebianWorld


  • MaximumDebian


  • DebianUsers


  • Debian-BR


  • IRC

    The place to get help on a Debian problem (after reading docs) or to just chat and chill is #debian on

    Many of the Debian Planet staff live there so pop by and say hello.

    Wanna write?

    Got that latest or greatest scoop? Perhaps you have some important news for the Debian community? Submit a news item!

    Or perhaps you’ve written a rather ground breaking insight into some aspect of Debian and you feel compelled to share it with others? Knock up a longer editorial article and send it to the editors.


    DP is sponsored by Xinit Systems and

    Domains paid for and hosted by

    Buy your Debian merchandise at

    Who’s Online

    There are currently, 66 guest(s) and 5 member(s) that are online.

    You are Anonymous user. You can register for free by clicking here.


    The comments are owned by the poster. We aren’t responsible for their content.

    sid not secure (Score: 1)
    by bartvh (what you want) on Thursday, October 25 @ 14:27:24 BST
    (User Info)

    Could you please explain why sid is not considered secure, or at least less secure than potato? Is there perhaps a greater chance that a security bug exists in a later version of a service implementation?

    I do not mean to bash, I just want to know.

    [ Reply | Parent ]

    SE Linux is not your answer (Score: 0)
    by Anonymous on Friday, October 26 @ 04:55:22 BST

    From the SE Linux site:

    “This work is not intended as a complete security solution for Linux. Security-enhanced Linux is not an attempt to correct any flaws that may currently exist in Linux. Instead, it is simply an example of how mandatory access controls that can confine the actions of any process, including a superuser process, can be added into Linux. The focus of this work has not been on system assurance or other security features such as security auditing, although these elements are also important for a secure system.”

    Assuming that you are only considering security from a systems/OS perspective, I’d:

    1. identify what am I trying to protect

    2. identify what threats exist to whatever your trying to protect

    3. you are backing up, right?

    4. identify what tools are available to protect you

    5. evaluate them in detail before coming to the conclusion that nothing else will provide you the level of comfort that you desire, or havea very specific understanding about how integrating SE Linux will enhance your current security protocol.

    Personally, I have implemented Linux-based security soulutions in the financial industry, without SE Linux.

    That said, SE Linux is a very interesting project. I’m excited to see how it develops.

    [ Reply | Parent ]

    Based on: PHP-Nuke

    All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2000 by Debian Planet

    You can syndicate our news using the file backend.php.