Security
Systemd syscall filtering
Learn more about the system calls (syscalls) that systemd may use in commands and unit files, such as with SystemCallFilter property.
Systemd features to secure units and services
Learn more about systemd features that help in securing units and services.
Security Through Obscurity (STO)
What is security through obscurity and what are examples when it comes to Linux security and system hardening?
Security concepts
Learn common security concepts that also will apply when securing Linux environments, like system hardening and implementing security measures.
How Linux Security Fails to be Simple
Linux Security Should be Simple, Right? Why that is not a reality, and we might never achieve it is discussed in this article.
Create random passwords with OpenSSL/LibreSSL
For a quick way of generating random passwords we can use the OpenSSL utility, part of OpenSSL and LibreSSL.
Simplifying Security: Choose the Right Toolkit, not Tool.
Too often we select security products based on the amount of features, instead of smart combinations. Don't think tools, but start building up a toolkit.
DevOps vs Security: Can Docker make a difference?
Docker Inc. is one of the pioneers in the world DevOps, Known for its toolkit around Linux container technology.
Security Best Practices for Building Docker Images
To ensure your Docker images are properly configured, we show some of the best practices. Building secure Docker containers doesn't have to be hard.
Optimize SSL/TLS for Maximum Security and Speed
Everyone loves secure websites, as long as they are quick. Let's configure our website for maximum security and performance, at the same time.
5 Basic Principles of Linux System Security
With 5 basic security principles we can improve system security of almost any Linux system.
Docker Security: Best Practices for your Vessel and Containers
In-depth article about Docker security features, best practices and its history. With container technology evolving, Docker security can be challenging..
Yum plugins: Available plugins and built-in security support
To determine the available yum plugins, we analyze them for our goal: discovering if security support is in the yum plugins itself or built-in by default.
Audit security events on Unix systems
Protecting computer networks consists of implementing preventative measures, including system auditing. Let's have a look how this relates to Linux.
Linux kernel security and how to improve it
Every system is as strong as its weakest link, especially the system kernel. This article explains Linux kernel security, what we can do and how to do so.
Conducting a Linux Server Security Audit
Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.
Open source vulnerability scanner for Linux systems – Lynis
Within this article we discuss the possibilities of using an open source vulnerability scanner for Linux based systems.
Auditing Linux: Software Packages and Managers
Article about how to audit and check installed software packages and their security by using the related package managers.