LearnAboutLinux.com

1 2 3 4

Tor Security for Android and Desktop Linux

Wednesday, 12 April 2017 - 15:32 PM - (Security)

Introduction

Internet service providers in the United States have just been given the green light to sell usage history of their subscribers by S J Res 34, more>>

Read More...

Simple Server Hardening, Part II

Tuesday, 11 April 2017 - 12:17 PM - (Security)

In my last article, I talked about the classic, complicated approach to server hardening you typically will find in many hardening documents and countered it with some specific, simple hardening steps that are much more effective and take a only few minutes. more>>

Read More...

Flat File Encryption with OpenSSL and GPG

Tuesday, 04 April 2017 - 09:46 AM - (Security)

The Pretty Good Privacy (PGP) application, which has long been known as a primary tool for file encryption, commonly focused on email. It has management tools for exchanging credentials with peers and creating secure communication channels over untrusted networks. more>>

Read More...

smbclient Security for Windows Printing and File Transfer

Tuesday, 28 March 2017 - 12:53 PM - (Security)

Microsoft Windows is usually a presence in most computing environments, and UNIX administrators likely will be forced to use resources in Windows networks from time to time. Although many are familiar with the Samba server software, the matching smbclient utility often escapes notice. more>>

Read More...

Hodge Podge

Tuesday, 21 March 2017 - 14:33 PM - (Security)

For every article, I try to write something that is interesting, entertaining, educational and fun. Sometimes I even succeed. Many other times I have some things I'd like to talk about, but there's not enough of it to fill the space. This time, I decided a disjointed hodge podge would be the theme. So let's just have a virtual nerdy talk about stuff, shall we? more>>

Read More...

William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)

Monday, 20 March 2017 - 13:49 PM - (Security)

Watch William Rothwell and Nick Garner's new Certified Ethical Hacker (CEH) Complete Video Course and learn everything you need to know to ace the CEH exam in less than 11 hours. more>>

Read More...

Preseeding Full Disk Encryption

Thursday, 16 March 2017 - 17:48 PM - (Security)

Usually I try to write articles that are not aimed at a particular distribution. Although I may give examples assuming a Debian-based distribution, whenever possible, I try to make my instructions applicable to everyone. This is not going to be one of those articles. more>>

Read More...

Minifree Ltd.'s GNU+Linux Computers

Monday, 13 March 2017 - 12:19 PM - (Security)

Minifree Ltd.—doing business as "Ministry of Freedom"—exists mainly for reasons Linuxers will like: to make it easier for people to get computers that respect their freedom and privacy, and to provide funding for a meaningful project, called Libreboot. more>>

Read More...

Two Factors Are Better Than One

Thursday, 09 March 2017 - 13:12 PM - (Security)

Although I've always been interested in security, there are just some security measures I've never liked. more>>

Read More...

Flash ROMs with a Raspberry Pi

Monday, 06 March 2017 - 10:18 AM - (Hardware)

I previously wrote a series of articles about my experience flashing a ThinkPad X60 laptop with Libreboot. After that, the Libreboot project expanded its hardware support to include the ThinkPad X200 series, so I decided to upgrade. The main challenge with switching over to the X200 was that unlike the X60, you can't perform the initial Libreboot flash with software. more>>

Read More...

SSH Communications Security's Universal SSH Key Manager

Friday, 03 March 2017 - 17:12 PM - (Security)

Today's IAM solutions, warns enterprise cybersecurity expert SSH Communications Security, fail to address fully the requirements of trusted access. Organizations lack an efficient way to manage and govern trusted access credentials and have no visibility into the activities that occur within the secure channels that are created for trusted access operations. more>>

Read More...

Secret Agent Man

Tuesday, 28 February 2017 - 13:50 PM - (Security)

It used to be that only the paranoid among us focused on strict security practices, yet these days, it seems like people are stepping up their games with respect to encryption, password policy and how they approach their computers in general. Although I always have considered myself more inside that paranoid camp than outside of it, I even have found myself stepping up my game lately. more>>

Read More...

Smoothwall Express

Friday, 24 February 2017 - 15:28 PM - (Security)

The award-winning Smoothwall Express open-source firewall—designed specifically to be installed and administered by non-experts—continues its forward development march with a new 3.1 release. more>>

Read More...

Own Your DNS Data

Thursday, 16 February 2017 - 14:56 PM - (Security)

I honestly think most people simply are unaware of how much personal data they leak on a daily basis as they use their computers. Even if they have some inkling along those lines, I still imagine many think of the data they leak only in terms of individual facts, such as their name or where they ate lunch. more>>

Read More...

IGEL Universal Desktop Converter

Wednesday, 15 February 2017 - 16:17 PM - (Hardware)

IGEL Technology's next-generation Universal Desktop Converter 3 (UDC3) is a powerful and universally deployable managed thin-client solution, a low-cost alternative to desktop hardware solutions. more>>

Read More...

1 2 3 4