LinuxSecurity.com

Syndikovat obsah
The central voice for Linux and Open Source security news.
Aktualizace: 13 min 19 sek zpět

Introduction to GPG Encryption and git-crypt

28 Prosinec, 2017 - 11:54
LinuxSecurity.com: While Open Source prides itself on open transparency, there are certain things that must be kept secret like team credentials or personal information. GNU's OpenPGP (GPG) encryption tool set coupled with git-crypt can be invaluable for sharing such information privately with colleagues.
Kategorie: Hacking & Security

One Small Step to Harden USB Over IP on Linux

28 Prosinec, 2017 - 11:52
LinuxSecurity.com: The USB over IP kernel driver allows a server system to export its USB devices to a client system over an IP network via USB over IP protocol. Exportable USB devices include physical devices and software entities that are created on the server using the USB gadget sub-system.
Kategorie: Hacking & Security

Kubernetes, standardization, and security dominated 2017 Linux container news

27 Prosinec, 2017 - 13:04
LinuxSecurity.com: Containers were big news in 2017, on Opensource.com and throughout the IT infrastructure community. Three primary storylines dominated container news over the past year:
Kategorie: Hacking & Security

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

27 Prosinec, 2017 - 12:56
LinuxSecurity.com: Perhaps you've been hearing strange sounds in your home-ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's voice. If so, you haven't necessarily lost your mind.
Kategorie: Hacking & Security

Best practices when running Node.js with port 80 (Ubuntu / Linode)

26 Prosinec, 2017 - 12:32
LinuxSecurity.com: I am setting up my first Node.js server on a cloud Linux node and I am fairly new to the details of Linux admin. (BTW I am not trying to use Apache at the same time.)
Kategorie: Hacking & Security

How to Generate CSR (Certificate Signing Request) in Linux

26 Prosinec, 2017 - 12:26
LinuxSecurity.com: Once a user completes the SSL Certificate purchase process, the very next step is to generate the CSR (known as Certificate Signing Request) and private key. The main purpose of generating CSR is, it turns the information of the website (which is being encrypted) into encrypted form and the private key is used when the Certificate is being installed.
Kategorie: Hacking & Security

The state of Linux security in 2017

26 Prosinec, 2017 - 12:15
LinuxSecurity.com: The year is closing, so it is time to review Linux security. Like last year, we look at the state of Linux security. A collection of the finest moments. Did we forget something important? Let us know in the comments. This post will remain updated in the upcoming weeks.
Kategorie: Hacking & Security

Gaps in software slowing down security professionals

26 Prosinec, 2017 - 12:08
LinuxSecurity.com: Gaps in software systems are slowing down security teams who are estimated to spend 10 hours a week dealing with the inefficiencies.
Kategorie: Hacking & Security