Charly's Column The sys admin’s daily grind: WebCalendarJun 20, 2008
Users log on to services such as SSH, ftp, SASL, POP3, IMAP, Apache htaccess, and many more using their names and passwords. These popular access mechanisms are a potential target for brute-force attacks. An attentive bouncer will keep dictionary attacks at bay.more »
Single-Packet Port Knocking Remote access security with single-packet port knockingMay 31, 2008
If you are looking for an extra layer of remote access security, try single-packet port knocking.more »
Access Control Lists Working with Access Control ListsMay 31, 2008
The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.more »
SE Linux Mandatory Access Control (MAC) with SELinuxMay 31, 2008
SELinux provides a safer system through the powerful concept of mandatory access controls.more »
Sshutout and Fail2ban Fighting dictionary attacks with Sshutout and Fail2banMay 31, 2008
Services that require a username and password for login are potential targets for dictionary attacks. Sshutout and Fail2ban introduce time penalties for invalid attempts.more »
The GnuTLS project has published two bugfix releases to close several vulnerabilities and resolve an error capable of interrupting connections.more »
The security and quality of Open Source software just keeps on improving, as code analysis by Coverity reveals.more »
Red Hat's David Airlie reports in his blog that a simple hack allowed him to develop an X server without root privileges in the course of just one afternoon.more »
But if you are not using the latest Linux kernel, your system is insecure.
Home routers will give room for custom firmware but still comply with FCC rules
Frank Karlitschek will continue to lead the open source ownCloud project
“Xenial Xerus” comes with a new packages format and several improvements for the enterprise.
Linux users can now download and install the Windows code editor
New initiative will address security and interoperability concerns around container technology.
Developers can use RHEL as a development platform without a subscription fee.
Windows users will soon have native access to the Bash shell.
Improvements to SMTP will provide better guarantee of confidentiality
Graphics vendor embraces new reality in Linux graphics