Security

Hack and / - Forensics with Ext4

Learn from my mistakes as I figure out how to gather forensics data on an ext4 filesystem. more>>

Packet Sniffing Basics

Imagine this: you're sitting in your local coffee shop sucking down your morning caffeine fix before heading into the office. You catch up on your work e-mail, you check Facebook and you upload that financial report to your company's FTP server. Overall, it's been a constructive morning. By the time you get to work, there's a whirlwind of chaos throughout the office. more>>

oauth logo

A Primer to the OAuth Protocol

OAuth uses digital signatures rather than the “Basic” authentication method used by the HTTP protocol. more>>

Paranoid Penguin - DNS Cache Poisoning, Part II: DNSSEC Validation

Configure your DNS server to check zone signatures using DNSSEC. more>>

Linux Distro: Tails - You Can Never Be Too Paranoid

Tails is a live media Linux distro designed boot into a highly secure desktop environment. You may remember that we looked at a US government distro with similar aims a few months ago, but Tails is different because it is aimed at the privacy conscious “normal user” rather than government workers. more>>

Security Monitoring and Enforcement with Cfengine 3

Cfengine is well known as a powerful system configuration management tool, but did you know you also can use it to secure your systems? more>>

Build a Better Firewall-Linux HA Firewall Tutorial

Tired of maintaining your expensive commercial firewalls? Check out how combining Firewall Builder with a Linux HA firewall pair can provide a big solution at a low price. more>>
screenshot

Live-Fire Security Testing with Armitage and Metasploit

Armitage and Metasploit let you attack your network like skilled criminals. Use these attacks to evaluate your security posture. more>>

Virtual Security: Combating Actual Threats

Learn how to secure your virtual environment from every angle. more>>

Paranoid Penguin - DNS Cache Poisoning, Part I

Understand and defend against DNS cache poisoning. more>>

Interview with a Ninja, Part II

Mick continues chatting with a figurative and literal hacker ninja. more>>

Interview with a Ninja, Part I

Mick chats with a highly skilled, highly ethical system cracker. more>>

Back from the Dead: Simple Bash for complex DdoS

If you work for a company with an online presence long enough, you'll deal with it eventually. Someone, out of malice, boredom, pathology, or some combination of all three, will target your company's online presence and resources for attack. more>>

Building a Transparent Firewall with Linux, Part V

Build a transparent firewall using an ordinary PC. more>>

Introduction to Forensics - A Report from Southwest Drupal Summit

What do you do once you realize one of your servers has been compromised? I recently had the opportunity to hear Linux Journal's own Kyle Rankin give a very impressive talk covering this situation at the Southwest Drupal Summit in Houston, Texas. more>>

Syndicate content
Geek Guide
The DevOps Toolbox

Tools and Technologies for Scale and Reliability
by Linux Journal Editor Bill Childers

Get your free copy today

Sponsored by IBM

Upcoming Webinar
8 Signs You're Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
11am CDT, April 29th
Moderated by Linux Journal Contributor Mike Diehl

Sign up now

Sponsored by Skybot