Home Search
kali - search results
If you're not happy with the results, please do another search
Top 5 Linux Penetration Testing Distributions
Linux penetration testing distributions are useful and versatile tools that can help you to get the most out of your Linux system while simultaneously...
SNAS.io, Formerly OpenBMP Project, Joins The Linux Foundation’s Open Source Networking Umbrella
By Arpit Joshipura, General Manager, Networking and Orchestration, The Linux Foundation
We are excited to announce that SNAS.io, a project that provides network routing topologies...
How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered
Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they...
Securing Embedded Linux
Until fairly recently, Linux developers have been spared many of the security threats that have bedeviled the Windows world. Yet, when moving from desktops...
Here Come the x86 Hacker Boards
The first x86-based community-backed hacker SBCs not backed by Intel or AMD have reached market, offering higher prices than most ARM SBCs, but with...
Tips for Securing your Home Network with Linux and Open Source
Security is at a prime and that’s not going to change in the unforeseeable future. With more and more people taking advantage of technology...
Should You Use Linux for A Start Up?
Let me tell you a story: You’ve drafted your business plan and you’ve got funding. You are a tech business and you’ve got to...
Fedora 21 a GO after Another RC, New Development Tick-Tock
The big news today is that a fifth release candidate for Fedora 21 was needed, but Fedora 21 was given a GO for the...
How to Find the Best Linux Distribution for a Specific Task
If you’re looking for a Linux distribution to handle a specific (even niche) task, there most certainly is a distribution ready to serve. From...
Securing SSH with two factor authentication using Google Authenticator
Securing SSH with two factor authentication using Google Authenticator
Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two...