Featured Linux Articles - Page 8
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
With the increasing popularity of Linux over the years, and the various Linux distributions that are constantly being released, it can be hard to choose the correct one for you. Because Linux is open source, and is not overseen by a specific vendor, knowing and picking the correct distribution can be challenging, however, no matter your requirements, you are bound to find a Linux distribution that suits your needs.
Cybersecurity threats are on the rise. With the rapid shift of the business environment to digital work, and the growing trends of work-from-home and global workforces, hackers and cybercriminals can have a field day.
With the rise of containers and virtual machines, some system administrators check their system logs less frequently. However, this is a mistake. Even if an application is containerized, it is still important to keep and analyze logs.
Linux is more secure than other operating systems. But that's not the only reason why you might not need an antivirus or firewall while using Linux.
Virtual private networks, or VPNs, have gained popularity, especially among enterprises, since they offer high security without sacrificing convenience. One of the most economical cybersecurity choices available today, they are simple to set up and utilize.
A checksum is a small-sized block of data that is used to identify faults in files introduced during transmission or storage. Checksums are frequently used to verify data integrity but are not used to validate data validity. In simple terms, it is just a sequence of numbers and letters used to check data for errors.
When it comes to the current state of our society now, we see now more than ever that employers, as well as employees, are embracing flexibility within the workspace with remote work. The norms and expectations surrounding remote working have shifted from the first quarter of 2020 to now.
While the Firewall may be configured to block the ports utilized by the various Linux services, it is also a good practice to stop any unnecessary services on the Linux system. Not only does this increase Linux security, but it also prevents unneeded programs from running and using system resources.
Learn about a File Descriptor vulnerability that was exposed at Blackhat USA 2022, and the lessons we can take away from this discovery.
Let's take a brief look at what Guillaume Fournier from Datadog presented at Blackhat USA 2022: “One of the fastest growing subsystems in the Linux Kernel is, without any doubt, eBPF (extended Berkeley Packet Filter)."
Due to its ability to act as the backend server for web applications, Node.js is becoming a trendy platform these days. However, it becomes crucial to take into account Node.js security policies when it comes to the world of microservices.
RavenDB, the veteran transactional NoSQL database, is used by hundreds of startups and many Fortune 500 companies around the world thanks to its reputation as an agile, safe, efficient, and stable database. RavenDB can integrate with and complement almost any existing data system with its impressive set of built-in features.
Last week, hackers, researchers, cybersecurity companies, and government officials descended on Las Vegas for Black Hat and DEFCON, lovingly referred to by many as ‘hacker summer camp”. This year’s events marked the 25th and 30th anniversaries of Black Hat and DEF CON, with more than 30,000 attendees from 111 different countries present this year. It also marked a return to form for the event amid the impacts of the COVID-19 pandemic.
There are many reasons why one might choose a VPN whether it be for privacy or unlocking geo-restricted content however, no one really takes into account the VPN protocols that these VPN providers use.
Open Source Intelligence (OSINT) is the practice of collecting information from published or publicly available sources for intelligence purposes.
A memoir written by Dave Wreski, Guardian Digital CEO, Founder of LinuxSecurity.com and author of the Linux Security Quick Reference Guide and Linux Security HOWTO.
If you use Linux, whether it is just to browse the web, use it as a VPN server, or even if you use it to hack people (Just kidding!), then it is pretty essential and worthwhile to understand the pros and cons of using a VPN for Linux.
The use of Web Applications is growing amongst businesses, however, that also makes these businesses a target for Cyber Criminals to attack. If there are vulnerabilities within your Web Application, then that means there is a flaw that attackers may exploit to really wreak some havoc to an individual, small business, or even large corporations alike.
In this increasingly digital era, every business, no matter the size, has to be vigilant about its cybersecurity. Data breaches have become rampant over the past several years, costing even the top companies millions of dollars in damages. Hackers are always scheming to steal critical data and so, it is best to stay ahead of the game.
Virtual Private Networks (VPNs) were initially created to grant workers who are remote, workers who travel, or workers who do not tend to be in the office access to the local network over an insecure network connection when they are not physically within the local network. Essentially, a VPN can be used for various reasons however, the main purpose was for the use of businesses and companies.