Security

Paranoid Penguin - Linux VPNs with OpenVPN, Part III

Secure remote networking, the OpenVPN way. more>>

Sudo Axes Escalation Glitch

Among the important benefits of Linux's permission hierarchy is its ability to keep untrusted users from running amok. The all-or-nothing nature of root access, however, can present headaches when users are trusted, but only so far. That is a problem the sudo utility attempts to solve, and does so fairly well — except for the occasional glitch. more>>

Paranoid Penguin - Linux VPNs with OpenVPN

Connect safely to the mother ship with a Linux VPN. more>>

Economy Size Geek - Who Goes There? Adventures in Amateur Security

“Firewalls are a hardware solution to a software problem.”—Someone at ShmooCon more>>

Paranoid Penguin - Linux Security Challenges 2010

Security challenges and worries for 2010: we live in interesting times indeed! more>>

Implement Port-Knocking Security with knockd

Instead of closing ports, make them disappear. more>>

What's New in Firewall Builder 3.0

Firewall Builder helps automate the process of configuring Linux, BSD and Cisco firewalls. Firewall Builder 3.0 comes with support for IPv6, branching rules and a lot more. It will save you time and help avoid errors. more>>

Paranoid Penguin - DEFCON: One Penguin's Annual Odyssey

Thousands of hackers in the same Las Vegas hotel? Sounds like a party to Mick! more>>

Paranoid Penguin - AppArmor in Ubuntu 9

Psst! Your Ubuntu system has been secretly hardened with AppArmor! more>>

Anthony Lineberry on /dev/mem Rootkits

Rootkits using /dev/mem could attack your system and leave virtually no trace—it even could be happening now! more>>

Paranoid Penguin - Building a Secure Squid Web Proxy, Part IV

Add squidGuard's blacklist functionality to your Squid proxy. more>>

Making Root Unprivileged

Mitigate the damage of setuid root exploits on your system by removing root's privilege. more>>
Syndicate content
White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState