Security

Systemd syscall filtering

Learn more about the system calls (syscalls) that systemd may use in commands and unit files, such as with SystemCallFilter property.

Systemd features to secure units and services

Learn more about systemd features that help in securing units and services.

Security Through Obscurity (STO)

What is security through obscurity and what are examples when it comes to Linux security and system hardening?

Security concepts

Learn common security concepts that also will apply when securing Linux environments, like system hardening and implementing security measures.

How Linux Security Fails to be Simple

Linux Security Should be Simple, Right? Why that is not a reality, and we might never achieve it is discussed in this article.

Create random passwords with OpenSSL/LibreSSL

For a quick way of generating random passwords we can use the OpenSSL utility, part of OpenSSL and LibreSSL.

Simplifying Security: Choose the Right Toolkit, not Tool.

Too often we select security products based on the amount of features, instead of smart combinations. Don't think tools, but start building up a toolkit.

DevOps vs Security: Can Docker make a difference?

Docker Inc. is one of the pioneers in the world DevOps, Known for its toolkit around Linux container technology.

Security Best Practices for Building Docker Images

To ensure your Docker images are properly configured, we show some of the best practices. Building secure Docker containers doesn't have to be hard.

Optimize SSL/TLS for Maximum Security and Speed

Everyone loves secure websites, as long as they are quick. Let's configure our website for maximum security and performance, at the same time.

5 Basic Principles of Linux System Security

With 5 basic security principles we can improve system security of almost any Linux system.

Docker Security: Best Practices for your Vessel and Containers

In-depth article about Docker security features, best practices and its history. With container technology evolving, Docker security can be challenging..

Yum plugins: Available plugins and built-in security support

To determine the available yum plugins, we analyze them for our goal: discovering if security support is in the yum plugins itself or built-in by default.

Audit security events on Unix systems

Protecting computer networks consists of implementing preventative measures, including system auditing. Let's have a look how this relates to Linux.

Linux kernel security and how to improve it

Every system is as strong as its weakest link, especially the system kernel. This article explains Linux kernel security, what we can do and how to do so.

Conducting a Linux Server Security Audit

Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.

Open source vulnerability scanner for Linux systems – Lynis

Within this article we discuss the possibilities of using an open source vulnerability scanner for Linux based systems.

Auditing Linux: Software Packages and Managers

Article about how to audit and check installed software packages and their security by using the related package managers.