Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
These days, it's more important than ever to tighten up the security on your servers, yet if you were to look at several official hardening guides, they read as though they were written for Red Hat ...
Claim your complimentary eBook (worth $31.99) for free, before the offer expires today on Dec 15. From creating networks and servers to automating the entire working environment, Linux has been ...
While traditional Enterprise Linux waits for patches, RLC-H detects and disrupts kernel exploits at runtime, protecting enterprise infrastructure during the critical window before vulnerabilities are ...
Apply a few basic hardening principles to secure your cloud environment. I've written about simple server-hardening techniques in the past. Those articles were inspired in part by the Linux Hardening ...
Trusted Computer Solutions (TCS), a developer of cross-domain, operating system and network security solutions, has announced that it has partnered with Vicom Infinity, an IBM Premier Business Partner ...
A friend of mine is on the mildly paranoid train and sends everything through encrypted email to me, so this is kind of giving me an excuse to work on building a Linux desktop I can use for this. I'm ...
I want to build a router for a friend, and she doesn't have much experience with *nix, so I want to make it as internet-ready out of the box as possible for her.<BR><BR>1) Don't want *BSD... want LFS ...
With limited resources available in the Linux security domain, this free to download book will be an invaluable guide in helping you get your Linux systems properly secured. Offer expires on Dec 15.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results