Security

Systemd syscall filtering

Learn more about the system calls (syscalls) that systemd may use in commands and unit files, such as with SystemCallFilter property.

Systemd features to secure units and services

Systemd has a wide set of unit settings available that can be used to secure units and system services. Learn which ones and how to implement them.

Security Through Obscurity (STO)

What is security through obscurity? This article explains this term including examples relevant to Linux security and system hardening.

Security concepts

Learn common security concepts that also will apply when securing Linux environments, like system hardening and implementing security measures.

How Linux Security Fails to be Simple

Linux Security Should be Simple, Right? Why that is not a reality, and we might never achieve it is discussed in this article.

Create random passwords with OpenSSL/LibreSSL

Generate random passwords with the help of the openssl command using the 'rand' function, often already available on Linux systems.

Simplifying Security: Choose the Right Toolkit, not Tool.

Too often we select security products based on the amount of features, instead of smart combinations. Don't think tools, but start building up a toolkit.

DevOps vs Security: Can Docker make a difference?

Docker Inc. is one of the pioneers in the world of DevOps and known for its toolkit around Linux container technology. Will Docker make things more secure?

Security Best Practices for Building Docker Images

To ensure your Docker images are properly configured, we show some of the best practices. Building secure Docker containers doesn't have to be hard.

Optimize SSL/TLS for Maximum Security and Speed

Everyone loves secure websites, as long as they are quick. Let's configure our website for maximum security and performance, at the same time.

5 Basic Principles of Linux System Security

With five basic security principles we can improve system security of almost any Linux system. Start here your journey to learn them.

Docker Security: Best Practices for your Vessel and Containers

In-depth article about Docker security features, best practices and its history. With container technology evolving, Docker security can be challenging..

Yum plugins: Available plugins and built-in security support

To determine the available yum plugins, we analyze them for our goal: discovering if security support is in the yum plugins itself or built-in by default.

Audit security events on Unix systems

Protecting computer networks consists of implementing preventative measures, including system auditing. Let's have a look how this relates to Linux.

Linux kernel security and how to improve it

Every system is as strong as its weakest link, especially the system kernel. This article explains Linux kernel security, what we can do and how to do so.

Conducting a Linux Server Security Audit

Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.

Open source vulnerability scanner for Linux systems – Lynis

Learn more about vulnerability scanning on Linux systems using the Lynis auditing tool. Check for weaknesses and security measures that can be implemented.

Auditing Linux: Software Packages and Managers

Article about how to audit and check installed software packages and their security by using the related package managers.