Linux
Learn more about Linux in this set of articles that cover system administration, Linux security, and managing applications.
How to block POST requests in nginx
Want to block all HTTP POST requests in nginx? There are multiple ways to achieve this and within this article we look at the best fit.
Livepatch: Linux kernel updates without rebooting
Livepatch is a feature to do live kernel patching for Linux systems. It allows applying security updates without rebooting the system. Learn how it works!
How to secure a Linux system
Looking to secure your Linux system? This security guide shows you how to perform system hardening and run technical audits to keep it in optimal condition.
The state of Linux security in 2017
The year 2017 is closing, so it is time to review Linux security. Like last year, we look at the state of Linux security. A collection of the finest moments.
Linux security myths
So what is true about Linux security and what isn't? In this article we look at common security myths when it comes to Linux.
The state of Linux security
This is the state of Linux security. With the most important updates around Linux and open source security. From conferences to self-protection.
Understanding memory information on Linux systems
Linux memory management is an extensive subject. This guide helps you understanding the how to analyze it and obtain available memory information.
How to see the version of Oracle Linux
Oracle Linux is based on Red Hat Enterprise Linux. At first, it may be confusing to determine what specific Oracle version of the operating system is used.
Show vulnerable packages on Arch Linux with arch-audit
With the right tool, arch-audit in this case, we can find any vulnerable package that is installed on a Arch Linux system. Learn how it works.
Linux security guide: the extended version
Feeling overwhelmed with the options available to secure your Linux system? With this guide, we walk step-by-step through the option, tools, and resources.
Difference between CentOS, Fedora, and RHEL
Difference between CentOS, Fedora, and RHEL.
The Most Influential Linux Security Blogs
Linux security is hot, yet blogs about Linux security are rare. Besides our own blog, here are the most influential bloggers and developers we know.
How Linux Security Fails to be Simple
Linux Security Should be Simple, Right? Why that is not a reality, and we might never achieve it is discussed in this article.
Increase kernel integrity with disabled Linux kernel modules loading
The Linux kernel can be configured to disallow loading new kernel modules. Learn how to configure this.
Password Security with Linux /etc/shadow file
Learn the structure of the /etc/shadow file and what the fields mean. After reading, the file should be less cryptic than it was before.
An Introduction Into Linux Security Modules
Security frameworks like SELinux, AppArmor, and SMACK, provide protection to Linux. Learn about these Linux security modules (LSM).
Monitoring Linux File access, Changes and Data Modifications
Linux has several methods available to protect your valuable data. With the right tool we can audit file access, including changes.
How to check if your Arch Linux system needs a reboot
Want to check if a reboot of the system is needed on Arch Linux? Here is how that can be done including the relevant commands.
Linux capabilities 101
Introduction guide and tutorial about the inner workings of Linux capabilities and how these capabilities are applied when running Linux processes.
Check for a required reboot on Debian and Ubuntu systems
Debian based systems, like Ubuntu, need sometimes a reboot as well. We have a look on determining if a required reboot is needed and due to what packages.
Security Program: Implementing Linux Security
We have a look at implementing Linux security in IT environments and the related success criteria. Let's plan for success and get those measures implemented!
Linux Security for DevOps
With security getting more and more attention, we focus on Linux security for DevOps. Also DevOps will need hardening, auditing and dealing with compliance.
Using File ACLs on Linux for Additional Security
Access control lists (file ACLs) can increase security due to its granular structure. In this article we have a look at file ACLs and the use of getfacl
Audit SuSE with zypper: vulnerable packages
Stay up-to-date with security patching is part of a decent security management process. This article looks into vulnerable packages on OpenSuSE.
Linux audit: Log files in /var/log/audit
This article describes the purpose of the audit.log file in /var/log/audit and the relationship with the Linux audit framework.
5 Tips to protect the Root account
The root account is a special account for Unix based systems. Protecting it with the right measures, secures the system and decreases system compromises.
Hardening Guides and Tools for Red Hat Linux (RHEL)
Overview of tools and hardening guides to implement system hardening for Red Hat Linux. Also applies Fedora, CentOS and Scientific Linux systems.
Auditing Linux processes: The Deep Dive!
In-depth article about auditing Linux processes. Determination of running processes, memory and on-disk structure and the proper tools for analyzing them.
Become a Linux Auditor: What to know?
Tips for people who would like to perform audits on Linux and become a Linux auditor in particular. Including hints regarding certifications and tools.
Auditing Linux: what to audit?
When auditing a Linux system, it might be hard to determine what to audit actually. This article will provide some guidance and tips.
Become a Linux auditor: tips to start with auditing the Linux platform
Guide to become a Linux auditor in just a matter of minutes. Focus on how to determine running processes, installed software or possible vulnerabilities.
Linux Audit Framework: using aureport
Guide regarding the aureport utility, including some aureport examples. Aureport helps with audit reports and is part of the Linux audit framework.
Linux kernel security and how to improve it
Every system is as strong as its weakest link, especially the system kernel. This article explains Linux kernel security, what we can do and how to do so.
Conducting a Linux Server Security Audit
Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.
Open source vulnerability scanner for Linux systems – Lynis
Within this article we discuss the possibilities of using an open source vulnerability scanner for Linux based systems.
CAATTs for Linux: Lynis
Article about a tool within CAATTs for Linux: Lynis. Helping auditors with computer-assisted audit tools and techniques, with focus on Linux and Unix scans.
Antivirus for Linux: is it really needed?
Is antivirus needed on Linux systems? The answer: it depends on your situation. Let's have a look why.