Tags: security

longleat_maze.jpg

Longleat maze
Find your way through the maze of online dangers with Tails, Tor, and tips from Carla Schroder.

Improve Your Online Security with Tails

The popular image of online dangers is scary bad guys trying to steal our stuff. This image is accurate if you remember to include unfettered corporate interests as the scary bad guys. Our protections against our good friends the telcos and cable companies have never been strong, and now they're...
Read 0 Comments

New Strain of Linux Malware Could Get Serious

A new strain of malware targeting Linux systems, dubbed "Linux/Shishiga," could morph into a dangerous security threat. Eset on Tuesday disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware. Linux/Shishiga uses four different protocols -- SSH, Telnet,...
Read 0 Comments

workstation-security.jpg

Backup and storage
Safe and reliable backups are a must for all system administrators. Here are some guidelines to consider for your own peace of mind.

How to Safely and Securely Back Up Your Linux Workstation

Even seasoned system administrators can overlook Linux workstation backups or do them in a haphazard, unsafe manner. At a minimum, you should set up encrypted workstation backups to external storage. But it’s also nice to use zero-knowledge backup tools for off-site/cloud backups for more peace...
Read 0 Comments

Google Zero-Trust Security Framework Goes Beyond Passwords

With a sprawling workforce, a wide range of devices running on multiple platforms, and a growing reliance on cloud infrastructure and applications, the idea of the corporate network as the castle and security defenses as walls and moats protecting the perimeter doesn’t really work anymore. Which is...
Read 0 Comments

NASA’s 10 Coding Rules for Writing Safety Critical Program

The large and complex software projects use some sort of coding standards and guidelines. These guidelines establish the ground rules that are to be followed while writing software.a) How the code should be structured?b) Which language feature should or should not be used? In order to be effective...
Read 0 Comments

The Cloud Foundry Approach to Container Storage and Security

Recently, The New Stack published an article titled “Containers and Storage: Why We Aren’t There Yet” covering a talk from IBM’s James Bottomley at the Linux Foundation’s Vault conference in March. Both the talk and article focused on one of the central problems we’ve been working to address in the...
Read 0 Comments

The Story of Getting SSH Port 22

The SSH (Secure Shell) port is 22. It is not a co-incidence. This is a story I (Tatu Ylonen) haven't told before. I wrote the initial version of SSH in Spring 1995. It was a time when telnet and FTP were widely used. Anyway, I designed SSH to replace both telnet (port 23) and ftp (port 21). Port 22...
Read 0 Comments

Protect Your Management Interfaces

When it comes to architecture design, one area that is often not given due consideration is the protection of the management interfaces used by administrators or operators to configure their infrastructure. These are the interfaces used to perform privileged actions on systems, and as such they're...
Read 0 Comments

The Architecture of the Web Is Unsafe for Today's World

Twenty-eight years ago, British computer scientist Tim Berners-Lee proposed a system to link text documents across a computer network. It changed the way the world communicates and does business. From its humble beginnings, the Internet has become a complex, dynamic, and heterogeneous environment....
Read 0 Comments

network-backhoe.png

ss utility
Dumping sockets is not quite as much fun as dumping a load from a backhoe but it has its charms. Learn more in this ss utility tutorial.

Probe Your Linux Sockets With ss

We all know and love netstat (network statistics), because it is a wonderful tool for viewing detailed network connection information. An interesting alternative is ss, socket statistics. ss is part of the iproute2 suite of network tools. ss displays statistics about your network sockets, which...
Read 0 Comments

Pages

Click Here!