Featured Linux Articles - Page 15
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Pioneers of business email security for the past 20 years, Guardian Digital draws on the merits of Open Source coupled with expert engineering and unparalleled customer support.
Cloud-based email security solution utilizes the open source methodology for securing business email, recognized by many as the best approach to the problem of maintaining security in the relentlessly dynamic environment of the Internet.
An Interview with Dave Wreski, CEO of Guardian Digital
Is your solution doing enough to protect your users? This article helps you to decide. These days, the words “spam email” and “data breach” are commonplace. With an estimated 3.8 billion email users worldwide (Radicati Group), it is no surprise that scammers and cyber criminals frequently utilize email as a vector to carry out their attacks. Most email users are aware of this exploitation, and many have taken what they believe are the necessary measures to secure their email accounts.
LinuxSecurity debunks some common myths and misconceptions regarding open source and Linux by answering a few Linux-related frequently asked questions.
After many months of development by a dedicated team of programmers and beta testers, the new LinuxSecurity is almost ready! With an all new look & feel, organizational changes, security events, and additions to our staff, we hope to better serve the Linux and open source community. Although there are many aesthetic improvements, a major part of our development has focused on creating a content structure and backend system that is easy to update.
As Linux and security evolves, so has Linuxsecurity.com! Since 1996, Linuxsecurity.com has been the most comprehensive resource for all things in the world of security and open source. And as open source continues its rise in securing the world's information, we are continuing our pursuit in being at the forefront of this exciting growth. So we are unveiling the new look of Linux Security.
The LinuxSecurity Administrative Team is excited to announce the upcoming launch of the new and improved version of LinuxSecurity.com.
Resiliency is an important factor to consider when evaluating an email security solution, yet this characteristic often goes overlooked.
Blockchain, being a decentralized & dis-intermediated data store, is being considered for rapid adoption, in several industries like Supply Chain Management, P2P Global Transactions, Internet of Things, Electoral Voting, Stock Exchanges etc...
Defcon 26 provided individuals and organizations with valuable tips and insight on security and the latest and most effective defenses. Here are some security-related highlights from the event.
Cyber threats are more sophisticated and dangerous than ever before! Are you securing your email accounts with a solution that is capable of preventing these advanced attacks?
Russian cyber criminals were able to hack the DNC despite its security defenses and very high level of intelligence. Small and medium sized businesses are at a much greater risk of experiencing an email-related attack. Is your company prepared?
Cloud technology and Linux-based cloud services are becoming increasingly popular due to the various benefits they offer in regard to security, efficiency, flexibility and convenience.
Packt Publishing, publisher of software learning resources, has revealed the results of its 2018 Skill Up survey in a new report.
Open source programs and solutions offer many advantages over proprietary alternatives including better quality, higher levels of security, superior flexibility, lower costs and a thriving community surrounding open source development.
System administrators are aware as how important their systems security is, not just the runtime of their servers. Intruders, spammers, DDOS attack, crackers, are all out there trying to get into people
With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.
Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."
Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit