Advisories

Feature Articles

Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.

Discover LinuxSecurity Features

5 Open-Source Blockchain Technologies That Linux Users Need to Know About

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With hundreds of thousands of open-source projects underway, it’s easy to say that open source has become a standard in software development. And when talking about open source, the first development environment that comes to mind is, of course, Linux. Halfway through 2020, around 50% of software developers say they use the Linux operating system (OS) for their projects.

Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Over the past few weeks, a heated debate has arisen on the Apache SpamAssassin users list regarding the replacement of racially charged terms like “whitelist” and “blacklist” used in the Apache Spamassassin Project’s code with more inclusive language. Certain community members have been very supportive of Apache SpamAssassin’s efforts to remove racially insensitive language from the project, while others have loudly voiced their disapproval.

Contribute to LinuxSecurity

Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.

Instructions for Disabling AdBlock Extensions on LinuxSecurity.com

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome to the LinuxSecurity.com instruction page on how to turn off your adblocker. We sincerely appreciate the support you are providing by choosing to disable your adblocker on our website. We depend on ad revenue to continue creating free, quality content for you to enjoy. Below are steps you can take in order to white list LinuxSecurity.com on your browser or device.

Google Chrome
Using AdBlock Plus

  • Click on the AdBlock Plus icon on the top right of your browser
  • A drop-down menu will appear with a check mark followed by Enabled on this site
  • Click the button until the text reads Disabled on this site
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Using Chrome adblock extension

  • Click on the hand icon for adblock extension, on the top right corner of your browser
  • A drop-down menu will appear
  • Click the Don't run on pages on this domain option on the drop down
  • Once clicked a settings popup will appear.
  • Click Exclude
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Firefox

  • Click on the AdBlock Plus icon on the top right of your browser
  • A drop-down menu will appear
  • Click the Disabled on LinuxSecurity.com option on the drop down
  • Refresh the page or click Continue to site to access LinuxSecurity.com
  • Firefox "Private Window" runs its own version of adblock. You will receive an adblock detection screen on Private Window, even if you are not running any adblock plugins. In this case, you will need to open LinuxSecurity.com on your standard Firefox window.

Internet Explorer

  • Click on the AdBlock Plus icon on the bottom right hand side of your browser
  • A drop-down menu will appear
  • Click the Disable on www.linuxsecurity.com option on the drop down
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Devices with Apple IOS9 and above

  • Go to the Settings app on the main screen
  • Click on the Safari button
  • From Menu click Content Blockers
  • You will see your blocker enabled. Slide button to the left to disable.
  • Return to your Safari browser and refresh the page or click Continue to site to access LinuxSecurity.com

Know The Enemy: Upgrade Your Threat Detection Strategy with Honeynets

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Honeynets are an invaluable offensive security tool for learning the tactics and motives of the blackhat community and sharing the information and insights gathered. This article will explore what a Honeynet is, its value, how it works and the risks involved with deploying a Honeynet. It will also examine some great open-source honeynet options your organization may wish to consider. 

New Report: Severe Flaws in Cyberoam’s Firewall and VPN Technology Left At Least 86,000 Networks Vulnerable to Exploit

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report published by vpnMentor examines two critical vulnerabilities in cybersecurity provider Cyberoam’s firewall and VPN technology, which - both independently and combined - could be exploited by malicious actors to access the company’s email quarantine system without authentication and remotely execute arbitrary commands.

Open-Source Security Projects: Choosing a Brandable .com Domain

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LinuxSecurity would like to thank NameEstate.com for contributing this article.

The importance of an open-source security project name can’t be overstated. A name serves as a first impression. It’s your first chance to tell people who you are and what you do. An impactful name is the best way to convey your value and what you can offer to clients. So, when it comes to open source security projects, finding a name that shows you are capable, trustworthy, and secure can determine your reach and success.

Must Read Articles

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.