Isof Looking for intruders with lsofJul 10, 2008
Track down and expose intruders with the versatile admin tool lsof.more »
Backdoors Techniques for building a hidden backdoorJul 09, 2008
Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.more »
Charly's Column The sys admin’s daily grind: WebCalendarJun 20, 2008
Users log on to services such as SSH, ftp, SASL, POP3, IMAP, Apache htaccess, and many more using their names and passwords. These popular access mechanisms are a potential target for brute-force attacks. An attentive bouncer will keep dictionary attacks at bay.more »
Single-Packet Port Knocking Remote access security with single-packet port knockingMay 31, 2008
If you are looking for an extra layer of remote access security, try single-packet port knocking.more »
Access Control Lists Working with Access Control ListsMay 31, 2008
The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.more »
SE Linux Mandatory Access Control (MAC) with SELinuxMay 31, 2008
SELinux provides a safer system through the powerful concept of mandatory access controls.more »
Sshutout and Fail2ban Fighting dictionary attacks with Sshutout and Fail2banMay 31, 2008
Services that require a username and password for login are potential targets for dictionary attacks. Sshutout and Fail2ban introduce time penalties for invalid attempts.more »
The GnuTLS project has published two bugfix releases to close several vulnerabilities and resolve an error capable of interrupting connections.more »
Innovative system adds a hard drive and Ubuntu Core to the RPi for an IoT hub.
Linux is two weeks younger than we thought!
The Apache Software Foundation considers retiring OpenOffice
Adobe won’t kill the plugin in 2017
Linux Foundation's big event celebrates the 25th anniversary of Linux
Linux has evolved from “won’t be a professional” project to one of the most professional software projects in the history of computers.
Competitors get in the game with RHEL without Red Hat
Security researchers have already notified Microsoft; some fixes are available
The company is collaborating with Google and Intel to use Kubernetes as an engine for Fuel