Backdoors Techniques for building a hidden backdoor
Jul 09, 2008Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.
more »Charly's Column The sys admin’s daily grind: WebCalendar
Jun 20, 2008Users log on to services such as SSH, ftp, SASL, POP3, IMAP, Apache htaccess, and many more using their names and passwords. These popular access mechanisms are a potential target for brute-force attacks. An attentive bouncer will keep dictionary attacks at bay.
more »Single-Packet Port Knocking Remote access security with single-packet port knocking
May 31, 2008If you are looking for an extra layer of remote access security, try single-packet port knocking.
more »Access Control Lists Working with Access Control Lists
May 31, 2008The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.
more »SE Linux Mandatory Access Control (MAC) with SELinux
May 31, 2008SELinux provides a safer system through the powerful concept of mandatory access controls.
more »Sshutout and Fail2ban Fighting dictionary attacks with Sshutout and Fail2ban
May 31, 2008Services that require a username and password for login are potential targets for dictionary attacks. Sshutout and Fail2ban introduce time penalties for invalid attempts.
more »Two GnuTLS Bugfix Releases
May 21, 2008The GnuTLS project has published two bugfix releases to close several vulnerabilities and resolve an error capable of interrupting connections.
more »Code Analysis: Open Source Keeps on Improving
May 20, 2008The security and quality of Open Source software just keeps on improving, as code analysis by Coverity reveals.
more »Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
-
DebConf24 to be Held in South Korea
Busan will be the location of the latest DebConf running July 28 through August 4
-
Fedora Unleashes Atomic Desktops
Fedora has combined its solid distribution with rpm-ostree system to make it possible to deliver a new family of Fedora spins, called Fedora Atomic Desktops.
-
Bootloader Vulnerability Affects Nearly All Linux Distributions
The developers of shim have released a version to fix numerous security flaws, including one that could enable remote control execution of malicious code under certain circumstances.