The minimum you can do to protect yourself is to avoid weak passwords. In most cases people do not know what weak passwords are and why are called such. Passwords that can be easily guessed or cracked are called weak passwords. Many security breaches worldwide are often the result of poor password choices. These poor […]
Lynis is an auditing tool for unix/linux like systems which is used to scan the entire unix/linux systems for security issues, installed software informations, general system information, configuration issues or mistakes, software patch management, malware and vulnerability, firewall auditing, user accounts without passwords, invalid file permissions and many more.
Facebook, Twitter, and Microsoft (in no particular order) were recently attacked by hackers. This led to a number of questions being raised. How did they manage to get into the servers of such big corporations? Why did they want to do it? And most importantly: Is Google any safer than these websites? To find the […]
Linux, unfortunately has been long surrounded by myths. Despite the speedy adoption of Linux as mainstream operating systems for enterprises particularly, the common misconceptions about Linux seem to continue. The post enlists five traditional myths about Linux Security and attempts to debunk each; discussing real facts.
The world of computing and the internet is a very normal and accepted entity to most geeks. But to some unknown, unsuspecting and unfamiliar users, the whole concept can seem quite strange, almost alien!
Unix security is a big world including Software and hardware, there is no guaranties to make your Unix system safe, but you can make it very difficult for the Crackers en Hackers; in this quick guide will show you some simple steps to protect your system.
Security-Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, through the use of Linux Security Modules (LSM) in the Linux kernel. It is a set of Kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security […]
Security should be an essential part of any system whether it be for a server running at the department of defense, or a dusty old computer sitting in the corner connected to the internet. The problem is though, most people don’t have a very good understanding of how to protect themselves from unwanted hackers, and […]