Home Search

kali - search results

If you're not happy with the results, please do another search

Top 5 Linux Penetration Testing Distributions

Linux penetration testing distributions are useful and versatile tools that can help you to get the most out of your Linux system while simultaneously...

SNAS.io, Formerly OpenBMP Project, Joins The Linux Foundation’s Open Source Networking Umbrella

By Arpit Joshipura, General Manager, Networking and Orchestration, The Linux Foundation We are excited to announce that SNAS.io, a project that provides network routing topologies...

How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered

Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they...

Securing Embedded Linux

Until fairly recently, Linux developers have been spared many of the security threats that have bedeviled the Windows world. Yet, when moving from desktops...

Here Come the x86 Hacker Boards

The first x86-based community-backed hacker SBCs not backed by Intel or AMD have reached market, offering higher prices than most ARM SBCs, but with...

Tips for Securing your Home Network with Linux and Open Source

Security is at a prime and that’s not going to change in the unforeseeable future. With more and more people taking advantage of technology...

Should You Use Linux for A Start Up?

Let me tell you a story: You’ve drafted your business plan and you’ve got funding. You are a tech business and you’ve got to...

Fedora 21 a GO after Another RC, New Development Tick-Tock

The big news today is that a fifth release candidate for Fedora 21 was needed, but Fedora 21 was given a GO for the...

How to Find the Best Linux Distribution for a Specific Task

If you’re looking for a Linux distribution to handle a specific (even niche) task, there most certainly is a distribution ready to serve. From...

Securing SSH with two factor authentication using Google Authenticator

Securing SSH with two factor authentication using Google Authenticator Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two...