LinuxSecurity Contributor - Brian Gomez
Brian Gomez
Since eighth grade, Brian has been passionate about Linux and cybersecurity. He studied IT at NJIT and earned his CCNA and Security+ certification. Brian enjoys making music, keeping up to date with the latest technologies, and hopes to become an Ethical Hacker.
Education: Studied IT at NJIT and earned his CCNA and Security+ certification
Experience: DevOps Engineer
Citizenship: USA
Articles From Brian Gomez
6 - 8 min read
Complete Guide to Vulnerability Basics
27 March 2023
The popularity of web applications is constantly growing as businesses and corporations host seve
LinuxSecurity.com Feature Articles
4 - 6 min read
The Most Important Things you Can do to Quickly Secure Ubuntu Linux
10 October 2022
Thanks to the fact that Linux is open-source, it is one of
LinuxSecurity.com Feature Articles
8 - 11 min read
Official Guide on Rocky Linux & How to Install It
26 September 2022
With the increasing popularity of Linux over the years, and the various Linux distributions that
LinuxSecurity.com Feature Articles
4 - 6 min read
Does Linux Need a Firewall & How To Configure the Linux Firewall with firewall-cmd
19 September 2022
Linux is more secure than other operating systems. But that's not the only reason why you might n
LinuxSecurity.com Feature Articles
7 - 10 min read
What You Need to Know when Considering a VPN on Linux
14 September 2022
Virtual private networks, or VPNs, have gained popularity, especially among enterprises, since th
LinuxSecurity.com Feature Articles
7 - 10 min read
What Are Checksums & Why Should You Be Using Them?
12 September 2022
A checksum is a small-sized block of data that is used to identify faults in files introduced dur
LinuxSecurity.com Feature Articles
5 - 8 min read
The Dangers of Using a VPN for Remote Work: Zero Trust to Replace It
07 September 2022
When it comes to the current state of our society now, we see now more than ever that employers,
LinuxSecurity.com Feature Articles
5 - 8 min read
All You Need to Know about Linux Services & Runlevels
05 September 2022
While the Firewall may be configured to block the ports utilized by the various Linux services, i
LinuxSecurity.com Feature Articles
4 - 6 min read
BlackHat USA 2022: Devils Are in the File Descriptors
31 August 2022
Learn about a File Descriptor vulnerability that was exposed at Blackhat USA 2022, and the lesson
LinuxSecurity.com Feature Articles
7 - 9 min read
BlackHat USA 2022: Return to Sender - Detecting Kernel Exploits with eBPF
29 August 2022
Let's take a brief look at what Guillaume Fournier from Datadog presented at Blackhat USA 2022:
LinuxSecurity.com Feature Articles
12 - 17 min read
Open-Source VPN Protocols Compared: Why WireGuard is on the Rise!
17 August 2022
There are many reasons why one might choose a VPN whether it be for privacy or unlocking geo-rest
LinuxSecurity.com Feature Articles
5 - 7 min read
Benefits & Drawbacks of Using a VPN on Linux
08 August 2022
If you use Linux, whether it is just to browse the web, use it as a VPN server, or even if you u
LinuxSecurity.com Feature Articles