Last change: 2025-01-06
Installed compilers might be abused by attackers in privilege escalation attacks, which is one of the reasons to remove compilers when possible.
Last change: 2025-01-06
Installed compilers might be abused by attackers in privilege escalation attacks, which is one of the reasons to remove compilers when possible.
Last change: 2025-01-10
The command apt-file can help with discovering which files belong to a package or what package installed or provides them. Learn which options to use.
Last change: 2025-01-06
With the right tool, arch-audit in this case, we can find any vulnerable package that is installed on a Arch Linux system. Learn how it works.
Last change: 2025-01-06
With the right Linux software tools, it is easy to find to which package a file belongs. Or the opposite, what files are part of an installed package.
Last change: 2025-01-06
Compilers can be abused by attackers to perform the so-called privilege escalation attacks. Here is how to find compilers and secure your system.
Last change: 2025-01-06
Systems running Fedora have the DNF utility. With DNF it becomes easily to install packages and stay up-to-date with security related updates.
Last change: 2025-01-06
To ensure your system is secure and stable, package management is an important task. To achieve that, use pkg_add to update your installed OpenBSD packages.
Last change: 2025-01-06
To determine the available yum plugins, we analyze them for our goal: discovering if security support is in the yum plugins itself or built-in by default.
Last change: 2025-01-06
Stay up-to-date with security patching is part of a decent security management process. This article looks into vulnerable packages on OpenSuSE.
Last change: 2025-01-06
Article about how to audit and check installed software packages and their security by using the related package managers.