Linux Audit

Linux security and system management blog

Linux Audit is one of the few blogs dedicated to Linux security. We aim for high-quality articles to explain security concepts and how they apply to Linux systems.

Interested in a particular subject or want to look around? The glossary might be a great start.

Stay up-to-date and the RSS/Atom feed to your RSS reader (e.g. Thunderbird)!

Did you know?

You can see wich processes are using a mount point and block unmounting it

lsof /mnt/photos

Also 💙 the command-line or terminal? Have a look at the command-line tips.

Latest articles

OpenSMTPD hardening profile

Tighten the already secure OpenSMTPD software on Linux by using this predefined profile that uses the systemd sandboxing options.

pacman cheat sheet

Cheat sheet for using the pacman package manager on Linux systems, including common tasks that are to be performed with pacman.

How to reload or restart a systemd service?

Services that are controlled with systemd can be reloaded or restarted depending on their configuration. Use systemctl to perform the related restart tasks.

How to check if a systemd service is enabled?

Systemd units can be enabled or disabled based on multiple factors, such as meeting specific dependencies. Learn how to see if a systemd service is enabled.

How to set environment variables in a systemd unit?

Systemd units can be configured to contain environment variables and passed along to the underlying application. Learn how to configure this unit setting.

Frequently Asked Questions

When it comes to Linux, there is so much to ask, like:

Multiple sections within this site cover the frequently asked questions for Linux and Linux security.

Recent changes

Topics

Auditing

Inspect your systems with security tools and manually by knowing what to look for.

Most recent changed article (of 60):
Linux Audit Framework

Auditing »

Automation

Save time by learning how to automate manual and repeating tasks.

Most recent changed article (of 12):
Shell scripting

Automation »

Compliance

Everything related to compliance, such as security auditing and system hardening.

Most recent changed article (of 15):
In-depth Linux Guide to Achieve PCI DSS Compliance and Certification

Compliance »

File systems

Everything about storing data on a file system

Most recent changed article (of 25):
Linux file permissions

File systems »

Hardening

Apply defenses to your Linux systems and make them less vulnerable.

Most recent changed article (of 30):
Linux server hardening and best practices

Hardening »

Kernel

Kernel parameters, system calls, and everything related to the core of every Linux system.

Most recent changed article (of 17):
Sysctl

Kernel »

Linux

Everything related to Linux, from the basics of system administration to running services and securing them.

Most recent changed article (of 39):
The state of Linux security

Linux »

Lynis

Tips and insights in using this security tool.

Most recent changed article (of 26):
How to update Lynis

Lynis »

Network

Network tuning and finding out why things are slow. Hint: it’s DNS.

Most recent changed article (of 25):
ip cheat sheet

Network »

Software

Configure, maintain, and monitor software applications

Most recent changed article (of 38):
Monitor file access by Linux processes

Software »

SSH

Hardening the SSH server and making smart use of SSH client options.

Most recent changed article (of 18):
SSH

SSH »

System administration

Learn generic Linux and security concepts with the articles in our system administrator category

Most recent changed article (of 220):
ip cheat sheet

System administration »

Vulnerabilities

Know what vulnerabilities could be present on your systems and how to harden your Linux environment.

Most recent changed article (of 12):
Understanding Linux privilege escalation and defending against it

Vulnerabilities »

Web

Let’s build a better web together

Most recent changed article (of 23):
Web

Web »