Linux Learn Tips and Tricks - Page 13
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Back in 2016, I took down the shingle for my technology coaching business. Permanently. Or so I thought.
If you’re reading this, chances are you’re: Pretty good at tech stuff Spending time with your family for Thanksgiving Bored because you’re reading this article right now
Every day, I use high-quality software that is developed and maintained by people who do not ask for payment, who respect my freedoms, and who are generous with their time and energy.
If you use your Linux desktop and never open a web browser, you are a special kind of user. For most of us, however, a web browser has become one of the most-used digital tools on the planet.
In this article, we will show how to run commands on multiple Linux servers at the same time. We will explain how to use some of the widely known tools designed to execute repetitive series of commands on multiple servers simultaneously.
Linux command line offers a lot of tools that help you know more about processes that are currently active in your system. One such utility is pmap, which reports the process memory map.
I've been writing frequently about Ubuntu and have come across a bunch of people who've dipped their toes into Linux desktop waters as a result. Perhaps they referenced this guide to create a bootable Live USB on Windows, allowing them to test drive something like Ubuntu without making any changes to their PC.
There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today.
SQL injection attacks are executed via front-end Web applications that don
An Information Security Policy is the cornerstone of an Information Security Program. It should reflect the organization's objectives for security and the agreed upon management strategy for securing information. Here's a great article on how to implement one in the real-world and how to get management to buy in to your plan.
SSH is one form of secure, remote access. And most of the time, it's one of the most popular ways to control your server from afar. But in the event that you don't have that option (rare as it may be), you may want to consider PHP Shell. You might wonder about the security of setting up a PHP script that allows shell commands to be executed, but PHP Shell is no more or less secure an application than any other PHP file on the server. Of course, you must be responsible for your own security.
phpBB, the popular forum software, has a lot of capability when it comes to authorization and template systems, among others. Protecting your forum from the various bots and spammers is an important aspect of any forum. This quick guide gives you a couple of options and even takes you through some implementation.
Ever wanted to secure your DVD collection? How about protecting you data-packed CDs? This is a quick and concise HOWTO on getting your circular media encrypted from possible attacker. It takes you through getting the necessary tools, and will work on any distro, even though it use Ubuntu.
The popular Linux security guru, James Turnbull, has everything you need to know on getting Bastille up and running. Hardening your Linux hosts doesn't have to be a difficult process, if you can use an automated security tool like Bastille Linux. Bastille covers a wide variety of platforms and distributions, making it ideal for configuring heterogeneous IT environments. In this tip, I'll describe the way Bastille Linux works and explain how to get started.
Welcome to the LabRat-JBroFuzzer introduction tutorial. In this tutorial we will review the basic uses for JBroFuzzer and how to start it in the LabRat live security distribution. This is an entry level tutorial that requires the user to know how to run a live ISO in VMware. If you are an advanced user and looking for programming resources to add to JBroFuzzer please check the OWASP JBroFuzzer page or Sourceforge. Read More
This paper presents a wealth of information, ranging from basic, all the way to advanced techniques used in defeating forensic analysis from affecting your network. Why is this important? Because as the tools for protection become more sophisticated, so do the tools for unwanted analysis, and forensics is one of the most growing aspects in security. This is a solid overview and serve as a great resource to find out what forensics is, what it does, where it's going, and what you can do to stop it.
Cross Site Scripting is one of the most common web vulnerabilities in existence today, and subsequently one of the most exploited issues. This tutorial is geared towards someone who may have heard of cross site scripting, and may even understand the concepts behind it, but would benefit by seeing real examples and having the opportunity to experiment with them. Read More
One of the fundamental security vulnerabilities that exist among many of the popular flavors of exploits such as XSS and SQL Injection, as well as many others, is the lack of input validation. Web applications that check...
This article explains how to recover lost files after you accidentally wipe your hard drive.
This document provides suggestions for how the Linux community can effectively advocate the use of Linux.