Last change: 2025-01-06
Learn how to get your SSH keys easier to another system using different available methods such as manually or a tool like ssh-copy-id
- ssh-copy-id
Last change: 2025-01-06
Learn how to get your SSH keys easier to another system using different available methods such as manually or a tool like ssh-copy-id
Last change: 2025-01-06
Configuration management and system auditing go hand in hand. In this article we cover both and learn why this combination is so powerful.
Last change: 2025-01-06
To counter the biggest threat to software packages, Debian and Ubuntu based systems can use unattended-upgrades, to install security patches automatically.
Last change: 2025-01-06
We talk about the risks when using Linux security hardening scripts in this article. Hardening Linux with scripts might look like a nice idea, but is it?
Last change: 2025-01-06
Machines are smarter, quicker and make less mistakes compared to humans. They might be the ultimate resource for security automation, securing our systems.
Last change: 2025-01-06
Sometimes we need to build things from source. In this article we install OpenSCAP on CentOS 7 by compiling and installing it manually.
Last change: 2025-01-06
Shell scripting doesn't have to be boring. Let's look at a few common things that many don't know about about shell scripts.
Last change: 2025-01-06
Article about a tool within CAATTs for Linux: Lynis. Helping auditors with computer-assisted audit tools and techniques, with focus on Linux and Unix scans.