Security News

Software and apps running on RedHat Enterprise Linux to touch $10 trillion of business revenues this year
2019-05-08 23:30

Software and applications running on Red Hat Enterprise Linux are expected to contribute to more than $10 trillion worth of global business revenues in 2019, powering roughly 5% of the worldwide...

How to securely delete files in Linux with SRM
2019-05-08 19:35

Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for more secure removal.

Microsoft Windows 10 will get a full built-in Linux Kernel for WSL 2
2019-05-07 10:33

Yes, you heard me right. Microsoft is taking another step forward to show its love for Linux and open source community by shipping a full Linux kernel in Windows 10 this summer. No, that doesn't...

The Linux Foundation and ETSI to bring open source and standards closer
2019-04-29 00:00

The Linux Foundation, the nonprofit organization enabling mass innovation through sustainable open source, signed a Memorandum of Understanding with ETSI, the independent organization providing...

How to install the OPNsense Firewall/Router Linux distribution
2019-04-18 15:30

Need a dedicated firewall appliance? OPNsense is a free, open-source solution, ready to protect your network from intrusion.

How to block SSH attacks on Linux with denyhosts
2019-04-11 17:32

If you depend on secure shell, learn how you can better protect your servers from SSH attacks.

How to enable two-factor authentication for SSH in Fedora Linux
2019-04-05 12:50

Any machine that allows SSH login would benefit from the addition of two-factor authentication.

How to change the default SSH port on your data center Linux servers
2019-04-04 15:53

Don't let those data center Linux servers use the default SSH port. Gain a bit of a security edge by configuring the daemon to use a non-standard port.

How to change the default SSH Port on your data center Linux servers
2019-04-04 12:38

Don't let those data center Linux servers use the default SSH port. Gain a bit of a security edge by configuring the daemon to use a non-standard port. Jack Wallen shows you how.

Sorry, Linux. We know you want to be popular, but cyber-crooks are all about Microsoft for now
2019-03-19 15:12

Oh, and Flash! Arrrrrggghhh Eight out of the ten most exploited vulnerabilities tracked by threat intelligence biz Recorded Future in 2018 targeted Microsoft products – though number two on its...