A password manager is a utility which helps users store and retrieve passwords and other data. Here’s our open source recommendations.
Read more
The Linux Portal Site
A password manager is a utility which helps users store and retrieve passwords and other data. Here’s our open source recommendations.
Read moreKeep your data safe. There are many different useful tools that offer disk encryption. Here’s our recommendations.
Read moreLinux is an excellent choice for anyone who wants to improve their cybersecurity. Here’s what you can do to improve your cybersecurity.
Read moreHere’s our recommended open source solutions to create your own Linux-based surveillance system. ZoneMinder, Motion, and Kerberos.io are featured.
Read moreDigital forensics is a specialist art. It allows investigations to be undertaken without modifying the media. Being able to preserve and analyze data in a safe and non-destructive way is crucial when using digital evidence as part of an investigation, and even more so when a legal audit trail needs to be maintained. Digital forensics can be used in a wide range of investigations such as computer intrusion, unauthorised use of computers including the violation of an organisation’s internet-usage policy, gathering intelligence from documents and emails, as well as the protection of corporate assets.
Read moreThis is a series of cornerstone articles highlighting essential system tools. These are small, indispensable utilities, useful for system administrators as well as regular users of Linux based systems.
Read moreThis article looks at Firejail, a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, Linux capabilities and seccomp-bpf.
Read moreLinux Kernel Runtime Guard (LKRG) is a loadable kernel module that performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel. As controversial as this concept is, LKRG attempts to post-detect and hopefully promptly respond to unauthorized modifications to the running Linux kernel (integrity checking) or to credentials (such as user IDs) of the running processes (exploit detection).
Read moreLinux has a good range of port scanners that help administrators identify and rectify weaknesses in a system. To provide an insight into the software that is available, we have compiled a list of 5 of our favorite port scanners.
Read more