The sixth patchlevel release of UCS 3.2 was published. This release includes, amongst others, updated packages for the Linux kernel, OpenSSL, the C-library (glibc) and the administrator tool sudo.
DFKI and Univention develop secure technology for third-party applications in Univention Corporate Server
As the use of and dependency on IT solutions grows, IT infrastructure security is becoming central to business survival. Industrial espionage and temporary production outages are just two possible consequences of poorly secured IT solutions. That is why research staff in the Cyber-Physical Systems department at the German Research Center for Artificial Intelligence (DFKI) and developers at the Bremen software provider Univention are creating a security infrastructure based on virtualisation techniques, as part of the “Safer Apps” project. The aim is to enable companies safely to install and run applications from third-party vendors in an existing IT infrastructure and in the cloud, without this posing risks or problems for that IT environment.
Even today, the general consensus still stubbornly persists that Open Source software is developed by ponytailed computer geeks as a hobby in the middle of the night. It’s admittedly a very romantic notion, but one which only reflects the reality to a certain extent.
The Linux Foundation recently published a very interesting document on who actually contributes to the Linux kernel. Since 2005, some 11,800 individual developers from around 1,200 different companies have contributed to the Linux kernel. The fact that recently at least 88.2% of the improvements came from people who are also paid for this work – a growing trend – is proof that more and more IT professionals are also working on Linux.
Blue skies, red sunset and a training room overlooking lake Washington. In this setting, the first UCS Training in the United States ended in Kirkland, WA, a Seattle suburb. Despite the initial challenge of offering training courses around the world, Univention North America welcomed the first participants to learn about the finer details of operating a domain based on Univention Corporate Server.
Problems of connecting to the various Amazon Cloud images were quickly solved and soon the participants and me, as their trainer, went into discussing the various questions from either the training or their production sides.
The advanced level of the participants quickly allowed for an in-depth look at more advanced topics such as Samba debugging and changing UMC templates, allowing both the participants and us as Univention to take home new insides into UCS as a product and the skills needed to run bigger domains.
Vijay Sankar, ForeTell Technologies Limited:
“Thanks again for your excellent class and for patiently answering all
sorts of questions.”
What’s the difference between us Germans and, let’s say Americans, if our spying or security agencies instruct the industry to provide them with all relevant data needed to “spy on friends”?
In keeping with tradition, we don’t do things informally. We document procedures in a proper contract that obliges all parties to confirm in writing that all information within the document is accurate and complete. What can we do, we are bureaucrats.
In the “Agency Contract ‘Transit'”, which has just been published, it is revealed that the German foreign intelligence service BND has been buying available “telecommunication” information from the Deutsche Telekom for a bargain of 6,800 EUR per month. That gives plenty of room for speculation about
the real reward.
The threat level is increasing! In 2014 alone, approximately 131,000 new types of malware were discovered daily – an increase of 250% when compared to the year before. This trend is continuing unabated: 9 million samples have already been discovered in the first quarter of 2015. It is not just the quantities that are rising at a staggering rate. The methods and types of malware are becoming increasingly sophisticated and harder to detect.
For example, the current trend is moving away from malware that is distributed in the form of email attachments (e.g. trojans) towards the distribution of links to websites that are infected with malware. This makes it more difficult to detect the source, since it is no longer directly connected to the user’s email. The malware is downloaded when a link is clicked. A hacker may infiltrate a trustworthy site with the goal of planting malware on it. To the user, it is difficult to recognize a link to a trusted site as a threat. Further, the developer of the malware can put another version online at any time as soon as the previous version is detected by antivirus software.
New: Docker Integration, App Center Tutorial, Extensions for the UCS Mail Server and Usability Improvements in the UMC
Today, we have released UCS 4.0-2, the second point release for UCS 4.0 that contains bug fixes, security improvements and many usability improvements based on actual user feedback.
New Zarafa Version for UCS Available: Manage Zarafa Users Without Extra license via The UCS Management System
Earlier this year, we from Zarafa, have informed our ecosystem about the direction of Zarafa’s future product development. It was one, very long newsletter where we showed how we see the world of communication & sharing. Most people only remembered one thing, though: Zarafa stops Outlook.
We have all got something to hide. There are some data that the law itself states not everybody should have access to.
Data need to be protected
Some data need to be protected. We need to make sure that we can reliably verify the identity of the individual attempting to access the data. To this end, there are systems available that we can employ to manage identities. Like Univention Corporate Server, for example. The simplest version of verifying an authorised user’s identity is also the one which has been tried and tested for the longest time: whether the user knows a secret. A password.
Yet simple passwords are falling more and more into disuse. For a long time now we’ve heard from reports across all media that simply knowing the secret “password” is no longer enough for reliably guaranteeing identities and protecting access to our data.