Tags: security

security-fundamentals-linuxcom-hero-v2b.jpg

Security fundamentals
This excerpt from the Security Fundamentals training course covers nmap -- another essential tool for troubleshooting and discovering information about the network and services.

Linux Security Fundamentals Part 6: Introduction to nmap

Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW In last week’s tutorial, we tried out tcpdump and wireshark, two of the most useful tools for troubleshooting what is happening as network traffic is transmitted and received on the system. nmap...
Read 0 Comments

Linus Torvalds on SHA-1 and Git: 'The Sky Isn't Falling'

Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked. The real worry about Google showing SHA-1 encryption is crackable, as pointed out by Peter Gutmann, a cryptography expert at the at the University of Auckland, New Zealand, is "...
Read 0 Comments

EFF: Half of Web Traffic is Now Encrypted

Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. The rights organization noted the milestone was attributable to a number of efforts, including recent moves from major tech companies to implement HTTPS on their own properties. Over the years,...
Read 0 Comments

Takeaways from the Open Source Leadership Summit: Mainstream Open Source, Security, Policy, and Business Models

By Melissa Smolensky The 2017 Open Source Leadership Summit, put on by the Linux Foundation, brought together leaders from the open source community in Lake Tahoe last week to discuss timely open source topics. The topics that came up most throughout the conference included: open source becoming...
Read 0 Comments

Memory Error Detection Using GCC

GCC has a rich set of features designed to help detect many kinds of programming errors. Of particular interest are those that corrupt the memory of a running program and, in some cases, makes it vulnerable to security threats. Since 2006, GCC has provided a solution to detect and prevent a subset...
Read 0 Comments

Understanding Cloud-Based Firewalls

There are cloud firewalls and there are cloud firewalls. While the underlying technology may be the same, there really are two types of products and use cases: One aims to protect the organization's network and users, while the other protects cloud infrastructure and servers. Let's contemplate the...
Read 0 Comments

workstation-security-githubpub-linuxcom-hero-2.jpg

Workstation Security Checklist
In this new blog series, we’ll lay out a set of baseline recommendations for Linux workstation security to help systems administrators avoid the most glaring security errors without too much inconvenience.

3 Security Features to Consider When Choosing a Linux Workstation

Learn how to work from anywhere and keep your data, identity, and sanity. DOWNLOAD NOW If your systems administrators are remote workers, you may wish to establish a set of guidelines to help ensure that their workstations pass core security requirements. This will help reduce the risk that they...
Read 1 Comments

Steps To Secure Your Website With An SSL Certificate

Is customer data safe on your website? When consumers provide credit card information or personal details, is the link between your site and their device secure — or open to prying eyes? Providing security is a necessity if your business sells products or services online. Your potential customers...
Read 0 Comments

Today's Leading Causes of DDoS Attacks

Last fall, we saw the biggest distibuted denial of service (DDoS) attack ever. This year we'll see even bigger ones. According to Akamai's latest State of the Internet Security report, here's what's behind them. First, you should know that while the total DDoS attacks only increased by 4 percent...
Read 0 Comments

Blockchain: A New Hope, or Just Hype?

Cryptocurrencies such as bitcoin may have captured the public’s fancy – and also engendered a healthy dose of skepticism — but it is their underlying technology that is proving to be of practical benefit to organizations: the blockchain. Many industries are exploring its benefits and testing its...
Read 0 Comments

Pages

Click Here!