Home Search

lin - search results

If you're not happy with the results, please do another search

Configure And Use Linux-PAM

In a previous post, we talked about Linux iptables firewall, and some people asked about authentication. Today we will talk about the powerful framework...

This Week in Open Source News: Edward Snowden Loves Open Source, New Linux Foundation...

This week in Linux and OSS news, Edward Snowden explains why he thinks proprietary software is very risky, SNAS.io Project joins The Linux Foundation,...

Linux Foundation Tackles Real-Time Data Analysis with SNAS.io Initiative

The Linux Foundation is looking to boost access to real-time analytics with the adoption of the former Open Border Gateway Monitoring Protocol (OpenBMP) platform into the open...

Microsoft Will Offer 3 Flavors of Linux in the Windows Store

Microsoft made headlines at last year's Build developer conference when it announced that it would build support for the Bash shell and Ubuntu Linux binaries directly...

Building Linux Firewalls With Good Old Iptables: Part 2

When last we met we reviewed some iptables fundamentals. Now you'll have two example firewalls to study, one for a single PC and one...

The Beauty of Links on Unix Servers

Symbolic and hard links provide a way to avoid duplicating data on Unix/Linux systems, but the uses and restrictions vary depending on which kind...

SNAS.io, Formerly OpenBMP Project, Joins The Linux Foundation’s Open Source Networking Umbrella

By Arpit Joshipura, General Manager, Networking and Orchestration, The Linux Foundation We are excited to announce that SNAS.io, a project that provides network routing topologies...

What are Containers? Learn the Basics in Online Course from The Linux Foundation

In this series, we’ll provide a preview of the new Containers Fundamentals (LFS253) course from The Linux Foundation. The course is designed for those who...

4 Best Practices for Web Browser Security on Your Linux Workstation

There is no question that the web browser will be the piece of software with the largest and the most exposed attack surface on...