Home Search

crack - search results

If you're not happy with the results, please do another search

Decreasing Vulnerabilities Seen in Red Hat Linux

As usual there's been a flurry of activity in the cloud and DevOps security space recently. In case you missed it, a particularly painful flaw...

Dell EMC: The Next Big Shift in Open Networking Is Here

This article was sponsored by Dell EMC and written by Linux.com. Ahead of the much anticipated 2018 Open Networking Summit, we spoke to Jeff Baher,...

Four Tips for a More Secure Website

Security is a hot topic in web development with great reason. Every few months a major website is cracked and millions of user records...

Finding Files with mlocate: Part 3

In the previous articles in this short series, we introduced the mlocate (or just locate) command, and then discussed some ways the updatedb tool...

Finding Files with mlocate: Part 2

In the previous article, we discussed some ways to find a specific file out of the thousands that may be present on your filesystems...

Crypto Anchors: Exfiltration Resistant Infrastructure

Lately, I've been thinking a lot about a concept that Nathan McCauley and I came up with a few years ago: crypto-anchoring—and how much impact this kind...

Secure Your Container Data With Ephemeral Docker Volumes

What with all the furor around containers and orchestrators, it can be easy to lose sight of some of their highly useful features. The...

Redirecting Network Traffic: Part 2

In the previous article, I looked at how to use the clever redir utility to listen out for inbound traffic on a particular port...

Using Redir to Alter Network Traffic: Part 1

There are times when, despite your best efforts, you have little choice but to put a quick workaround in place. Reconfiguring network-border firewalls or...

Hardening Docker Hosts with User Namespaces

Securing your Docker containers and the hosts upon which they run is key to sustaining reliable and available services. From my professional DevSecOps perspective,...