How to Write a Rootkit Rootkits for the Linux kernel 2.6

Jul 31, 2006

Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.

more »

Rootkits and Linux Security Kernel 2.6 rootkits and the quest for Linux security

Jul 31, 2006

Your Linux system may not be so airtight after all. To understand the threats, you need to think like an intruder. We'll show you what the intruders are thinking now about the Linux 2.6 kernel.

more »

AppArmor Shutting out intruders with AppArmor

Jul 31, 2006

When an attacker succeeds in infecting a victim’s system, the attacker inherits the victim’s privileges. App Armor beats the attack by reducing the potential victim’s privileges to a minimum.

more »

Ask Klaus!

May 31, 2006
System Crash My system keeps crashing at moments that seem completely random. Someone suggested I do a “memory dump......
more »

Linkchecker 3.3 Finding dead web links with Linkchecker

May 31, 2006

Linkchecker grooms your site to uncover references to missing pages.

more »

Phishing and Pharming Pharming, and the threat of identity theft

May 31, 2006

The pharmers and phishers are after your precious financial infor-mation. We’ll show you how to protect your interests.

more »

Orca Monitoring Linux performance with Orca

Mar 31, 2006

Monitor and troubleshoot Linux system performance with the free and powerful Orca.

more »

Ask Klaus!

Dec 31, 2005
Sound Cards I have put several Linux distros on my computer, and I could never find one that successfully installed......
more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News