5,006 entries found:
) Next »
In this tutorial, we will show you how to install and use the UFW firewall system on a Linux VPS running Debian 9. Security is a very important thing to consider when you run your own server.
Nmap and its associated files provide a lot of valuable information, but you have to know how to get it.
Banner grabbing is a common reconnaissance technique used in penetration testing. Let's take a look at some tools used to perform banner grabbing and how to launch your first grab.
ffsend is a fully featured CLI client for Firefox Send. This article explains how to securely share files from commandline with ffsend on Linux.
Learn how to use Nmap and some of it's scripts to run a security audit on your system. Easily gain valuable information on the security posture of your system.
Believe it or not, Microsoft is readying its Microsoft Defender Advanced Threat Protection for Linux servers. Yes, you read that right: Linux servers.
Learn how you can build a hacking station with Raspberry Pi and Kali Linux and use it to identify security vulnerabilities in your smart home system.
In meantime the only option brought me to success installing telegram-desktop on CentOS 8.1 appears to be snap.
This brief tutorial explains how to limit the number of SSH logins per user or group or system on Linux using /etc/security/limits.conf file.
Firewalls are great but they're ineffective if something goes wrong with them. The /etc/hosts.allow and /etc/hosts.deny files are the second line of defense against intruders.
A poster created by the West Midlands Regional Organised Crime Unit (WMROCU) and also featuring the logo of UK’s National Crime Agency (NCA) warns that the kids using software like Tor Browser, Kali Linux, Discover, and Metasploit could be the next-generation hackers.
DLN Xtend, Linux Kernel 5.5, Solus 4.1, Tails 4.2, Kali Linux, elementary OS, Sudo Bug, Pine64 HardROCK64, PinePhone, Canonical Anbox Cloud, Kdenlive, RawTherapee, Kubuntu Focus, WINE, Proton & more
Tcpdump is a free and open-source command-line utility that can be used to capture the incoming and outgoing network traffic from your system. In this tutorial, we will show you how to capture packets using Tcpdump on Linux with some examples.
Easily create a restricted user to allow guest access to your system or to create a Linux based kiosk. The xguest package makes this a snap!
This is sequel to my first post which is about Wireless Penetration Testing.Please check it out for more details.
The ability to connect devices without physical access to them, also makes it hard to control who has that access. In this tutorial, we will go through various methods of gaining access to protected wireless networks, which will give you the needed know-how that will help you to set up your wireless environment as secure as possible. Due to the open nature of Linux, there are loads of ready made Linux distributions out there, whose sole purpose is penetration testing, and among them there are a few specialized in wireless field.
The Debian Project published today a new security bulletin to inform users about a Sudo vulnerability that affects the Debian GNU/Linux 9 “Stretch” operating system series.
If you’re curious about Tor browser, then you already know how important your privacy and anonymity online can be. And yes, Tor browser is a great tool that can help keep you safe. But there’s a lot of confusion about its pros and cons, and especially, about how it relates to VPNs
Naxsi is an open-source web application firewall specially designed for Nginx. Checkout my post about how to install and configure Naxsi on Ubuntu.
Canonical has released today a new Linux kernel security update for the Ubuntu 16.04 LTS (Xenial Xerus) operating system to address several vulnerabilities.
It is a good idea to keep your confidential data in an encrypted location to prevent unauthorized access. It becomes more important when you share your computer with others. Encryption encrypts the information so that it is unreadable to anyone. VeraCrypt is an open-source tool for encrypting files, folders and entire partitions, available not only for Linux, but also for Windows and Mac OS. In this article, I will describe how you can encrypt a partition under Linux with VeraCrypt.
Offensive Security kicks of 2020 with the first release of their Kali Linux ethical hacking and penetration testing GNU/Linux distribution, Kali Linux 2020.1.
The iptables command is a powerful interface for your local Linux firewall. It provides thousands of network traffic management options through a simple syntax.
OpenVAS is an open-source Vulnerability Assessment System that can be used to run the test against servers for known vulnerabilities. Checkout the post on how to install and configure openVAS on Ubuntu.
Tutorial on how to install and configure Network Intrusion Detection System Snort on Centos 8.
A new version of IPFire, the only Linux-based and open-source firewall distribution, has seen the light of day to bring more improvements and updated components.
Fail2ban is a free, open-source and most widely used IPS (Intrusion Prevention System) application that can be used to protect your server against brute force password login attacks. In this post I have explained how to configure and install Fail2ban utility on Centos 8. Also Check out how you can protect your SSH and HTTP against different kinds of attacks using Fail2Ban.
Using Restricted Shell, we can easily limit user's access to the Linux system. Once you put the users in restricted shell mode, they are allowed to execute only limited set of commands.
openEuler, New Firefox 72 Released, Linus Say No To ZFS In Kernel, New Dell Linux Laptop, Nvidia Wakes Up
Delayed Admin utility will temporarily drop admin privileges to administrators. It will not remove the admin privileges of an administrative user account completely, but delays them for a particular time.
Linux kernel security can be increased at runtime using sysctl, allowing to mitigate potential vulnerabilities and exploits.
Tails, the amnesic incognito live system based on Debian GNU/Linux, which focuses on delivering online privacy to those who need a portable operating system, has been updated to version 4.2.
The basic concept involved with the use of the osquery application is the "tabular abstraction" of many aspects of the operating system, such as processes, users, etc. The data is stored in tables which can be queried using SQL syntax, directly via the osqueryi shell, or via the osquerydemon.
In this tutorial we will see how to install the application, how to run basic queries, and how to use FIM (File Integrity Monitoring).
Canonical released today the first Linux kernel security update for all of its supported Ubuntu Linux releases to address more than 30 security vulnerabilities.
We explore 3 examples of privacy and security focused Linux distributions. Each of these operating systems approach security in a different manner. We provide an overview of how each works and outline the some benefits of each.
This article describes how to install and configure dnscrypt-proxy to use DNSCrypt and DNS-over-HTTPS (DoH) with DNSSEC.
If security is a process (and it is), then it stands to reason that different projects (and contributors) are in different places. Some applications have years of security testing, with design done by people who have worked in information security for decades. Others are brand new projects by developers working on their first open source project. It comes as no surprise that Opensource.com's top security articles of 2019 represent this range of experience.
BlackArch Linux developers announced today the release of new ISOs and OVA image for their penetration testing and ethical hacking operating system with new tools and many improvements.
Although Linux is popular for being mostly virus-free, there might still exist some-especially if you usually download stuff from unreliable sources. Since viruses are not a major issue in Linux, there is not a huge pool of antivirus available for this operating system. One of the best among these is the ClamAV antivirus which does its job pretty well. In this article, we will explain how you can install and use ClamAV and ClamTK GUI to scan Debian for viruses.
Topics covered in this episode: Linux Mint 19.3 Released, Dual GPU Improvements Coming to Gnome, Purism Announces Librem Server, FUSE For macOS Goes Closed Source, Life Is Strange 2
Linux has now already been certified to meet the three different security certifications required by the United States Department of Defense.
Secure Shell (SSH) is a cryptographic network protocol used for an encrypted connection between a client and a server. The ssh client creates a secure connection to the SSH server on a remote machine. The encrypted connection can be used to execute commands on the server, X11 tunneling, port forwarding, and more. Learn how to use the OpenSSH command-line client to log in to a remote machine and run commands.
Safely install Npm packages by auditing them for known vulnerabilities using "Npq" in Linux.
fdns is a DNS-over-HTTPS proxy server targeted at small networks and Linux desktops. To speed up the name resolution fdns caches the responses, and uses a configurable adblocker and privacy filter to cut down unnecessary traffic. The software is written in C and it is released as part of Firejail project under GPLv3 license.
Setting up Two-factor authentication is very important for any online service we use today. It secures account from having any unauthenticated person access to your account even with the login credentials.
Toplip is a free and open source encryption utility that uses a very strong encryption method called AES256, along with an XTS-AES design to safeguard your confidential data.
Privacy developers concerned over Chocolate Factory plans. A nascent web API called getInstalledRelatedApps offers a glimpse of why online privacy remains such an uncertain proposition. In development since 2015, Google has been experimenting with the API since the release of Chrome 59 in 2017. As its name suggests, it is designed to let web apps and sites determine whether a corresponding native app is installed on a user's device.…
ZorinOS Privacy Concerns
Ubuntu Touch Runs On Raspberry Pi
Librem 5 Birch Has Shipped
Fedora Users Concerned GNOME Software Proprietary Software
Linux Powered Handheld Returns
There is a lot to like about U.S. Sen. Cantwell’s new Consumer Online Privacy Rights Act (COPRA). It is an important step towards the comprehensive consumer data privacy legislation that we need to protect us from corporations that place their profits ahead of our privacy.
Is your organization highly resilient to cyber attacks? Consider these three approaches to building resilience into strategy
) Next »