LearnAboutLinux.com

1 2 3 4

My Love Affair with Synology

Thursday, 22 June 2017 - 13:23 PM - (Hardware)

In my "Hodge Podge" article in the October 2016 issue, I mentioned how much I love the Synology NAS I have in my server closet (Figure 1). more>>

Read More...

Never Trust Yellow Fruit

Tuesday, 20 June 2017 - 14:34 PM - (Security)

You've probably heard about the WiFi Pineapple from Hak5. It's a fascinating device that allows you to do some creepy pen testing. It's the sort of tool that could be used for evil, but it's also incredibly useful for securing networks. more>>

Read More...

BlueCat DNS Edge

Monday, 19 June 2017 - 11:27 AM - (Security)

Migration to the cloud, the flexibility of network virtualization and the promise of IoT involve IT transformations that have placed incredible strain on enterprise security. more>>

Read More...

Improving Linux Security with DevSecOps

Wednesday, 31 May 2017 - 14:15 PM - (Security)

Ask people who run IT departments these days what keeps them up at night, and they'll probably tell you it's security—or the lack of it. With the explosive growth of malicious attacks on everything from hospitals to Fortune 500s, security—not hardware, software and even staff—is what currently makes life miserable. more>>

Read More...

Wibu-Systems CmASIC

Friday, 19 May 2017 - 15:30 PM - (Security)

Wibu-Systems describes the new generation of its CmASIC module as "the answer to the security-by-design needs of modern embedded computing technology leaders:. CmASIC is a module that Intelligent Device Manufacturers (IDMs) can directly embed into their boards to provide out-of-the box security and entitlement management. more>>

Read More...

CyKick Labs Ltd.'s Telepath

Wednesday, 03 May 2017 - 13:27 PM - (Security)

When a shopper enters a store, the retailer doesn't know if the person will simply browse, make purchases, shoplift or hold up the register. The same goes for visitors to a website. The challenge is to prevent and stop the bad guys without hindering beneficial customer transactions. more>>

Read More...

PasswordPing Ltd.'s Exposed Password and Credentials API Service

Friday, 28 April 2017 - 16:15 PM - (Security)

The typical online user has an average of 90 active and inactive online accounts. This exposure to threats, notes software and IT security specialist PasswordPing Ltd., helps to inform us why billions of credentials have been exposed in the past five years alone. To assist organizations and companies to screen their user accounts for known, compromised credentials, PasswordPing Ltd. more>>

Read More...

Tor Security for Android and Desktop Linux

Wednesday, 12 April 2017 - 15:32 PM - (Security)

Introduction

Internet service providers in the United States have just been given the green light to sell usage history of their subscribers by S J Res 34, more>>

Read More...

Simple Server Hardening, Part II

Tuesday, 11 April 2017 - 12:17 PM - (Security)

In my last article, I talked about the classic, complicated approach to server hardening you typically will find in many hardening documents and countered it with some specific, simple hardening steps that are much more effective and take a only few minutes. more>>

Read More...

Flat File Encryption with OpenSSL and GPG

Tuesday, 04 April 2017 - 09:46 AM - (Security)

The Pretty Good Privacy (PGP) application, which has long been known as a primary tool for file encryption, commonly focused on email. It has management tools for exchanging credentials with peers and creating secure communication channels over untrusted networks. more>>

Read More...

smbclient Security for Windows Printing and File Transfer

Tuesday, 28 March 2017 - 12:53 PM - (Security)

Microsoft Windows is usually a presence in most computing environments, and UNIX administrators likely will be forced to use resources in Windows networks from time to time. Although many are familiar with the Samba server software, the matching smbclient utility often escapes notice. more>>

Read More...

Hodge Podge

Tuesday, 21 March 2017 - 14:33 PM - (Security)

For every article, I try to write something that is interesting, entertaining, educational and fun. Sometimes I even succeed. Many other times I have some things I'd like to talk about, but there's not enough of it to fill the space. This time, I decided a disjointed hodge podge would be the theme. So let's just have a virtual nerdy talk about stuff, shall we? more>>

Read More...

William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)

Monday, 20 March 2017 - 13:49 PM - (Security)

Watch William Rothwell and Nick Garner's new Certified Ethical Hacker (CEH) Complete Video Course and learn everything you need to know to ace the CEH exam in less than 11 hours. more>>

Read More...

Preseeding Full Disk Encryption

Thursday, 16 March 2017 - 17:48 PM - (Security)

Usually I try to write articles that are not aimed at a particular distribution. Although I may give examples assuming a Debian-based distribution, whenever possible, I try to make my instructions applicable to everyone. This is not going to be one of those articles. more>>

Read More...

Minifree Ltd.'s GNU+Linux Computers

Monday, 13 March 2017 - 12:19 PM - (Security)

Minifree Ltd.—doing business as "Ministry of Freedom"—exists mainly for reasons Linuxers will like: to make it easier for people to get computers that respect their freedom and privacy, and to provide funding for a meaningful project, called Libreboot. more>>

Read More...

1 2 3 4