Security News

How to enable and configure Auditd on CentOS 7
2019-03-07 18:49

Learn how to install Auditd on CentOS 7 and how to add a new rule to watch for file system changes.

How to install AIDE intrusion detection system on CentOS 7
2018-11-27 14:59

Your CentOS 7 servers are rock solid, but could still use a bit of help. Find out how to install an easy to use intrusion detection system in less than five minutes.

New Linux Kernel Bug Affects Red Hat, CentOS, and Debian Distributions
2018-09-26 12:18

Security researchers have published the details and proof-of-concept (PoC) exploits of an integer overflow vulnerability in the Linux kernel that could allow an unprivileged user to gain superuser...

Linux Kernel Vulnerability Affects Red Hat, CentOS, Debian
2018-09-26 10:25

Qualys has disclosed the details of an integer overflow vulnerability in the Linux kernel that can be exploited by a local attacker for privilege escalation. The flaw, dubbed “Mutagen Astronomy,”...

How to manage zones on CentOS 7 with firewalld
2018-08-24 16:28

Jack Wallen shows you how to extend the flexibility of the CentOS 7 firewall with firewalld zones.

Linux admins: Dire vulnerability gives attackers root access in RHEL, CentOS, Fedora
2018-05-16 12:21

A flaw related to a NetworkManager integration script is trivially easy for attackers to leverage.

How to install Packetfence on CentOS 7
2018-05-03 15:38

Jack Wallen walks you through the process of installing the Packetfence Network Access Control system on CentOS 7.

How to easily manage CentOS firewalld with an ncurses tool
2018-04-26 18:00

Jack Wallen shows you how to make working with CentOS 7 iptables much easier with the help of an ncurses-based GUI.

How to set up two-factor authentication on CentOS
2018-04-19 15:06

Every administrator should consider enabling two-factor authentication on their CentOS 7 server for an added layer of security.

How to set up two-factor authentication on CentOS 7
2018-04-12 17:16

Once you have CentOS 7 up and running, you'll want to lock down that server with two-factor authentication. Every administrator should consider enabling this additional layer of security.