Feature Articles - Page 1.75
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
A weak password can be as simple as having a password equal to a username, a blank password, or combination passwords such as ‘qwerty’. Users feel that they can get away with leaving a weak password oftentimes because they have trouble keeping track of them.
Because of the changing nature of the data management environment, many businesses are turning to data governance consultancy as a compliance tool. Data governance consulting aims to help businesses develop strategies, policies, and frameworks to ensure their data's security, privacy, and integrity. Linux and open-source security play a crucial role in achieving these objectives for organizations that use Linux-based systems and open-source software.
Passkeys are created on user devices, so you must select the correct one to log in to the services and websites. Passwords are no longer required, which is one of the main advantages of this convenient, up-and-coming feature.
Linux device management is pivotal in contemporary managed service providers' (MSPs) core operations. With a growing reliance on Linux systems within organizations, adeptly administering these devices is a defining factor for MSPs. In the rapidly evolving tech landscape, the surge in Linux adoption is driving MSPs to deliver efficient Linux device management services that align with the distinct needs of their clients.
Peer-to-peer (P2P) torrenting users face many risks, ranging from downloading malware to inadvertently downloading unauthorized content. Your computer may get infected with viruses, your ISP may limit your connection, or you may face penalties.
At last count, nearly half of all small businesses used cloud-based hosting and infrastructure services. SMBs are doing so because it allows them to use enterprise-grade technology at affordable prices. However, many small business owners and decision-makers don't fully appreciate the level of risk that comes with their cloud footprint. And that's a blind spot that can have significant bottom-line consequences.
Recently, the media has been covering many Internet break-ins, their reporters spinning tales of clever bandits who magically gain access to machines with a simple keystroke. In real life, however, it is rarely that simple. Cracking into a computer system requires planning. A cracker has to find a target machine, and then find out what ports the machine is listening on before a system can be compromised.
If your Linux system were a busy airport, the GNU C Library (glibc) would be the control tower that could give malicious actors free rein on your systems, like a pilot who hijacked an airplane. Recently, a severe vulnerability dubbed "Looney Tunables" (CVE-2023-4911) was found in this integral part of most Linux systems that provides basic system functions like file I/O, network, and memory access.
With cyber threats becoming alarmingly sophisticated, IT professionals constantly struggle to keep digital assets safe. It's not just about reacting to threats anymore; it's about building a security system that’s as dynamic and adaptable as the threats themselves. Linux, with its open-source, transparent framework, offers precisely that.
Data security is critical for running your business smoothly and earning customers’ trust. People provide information when purchasing products at e-commerce sites, signing up for services, giving feedback about experiences, and much more. However, many are becoming less open to sharing their data with companies unless they feel confident employees there will handle it responsibly.
Several critical vulnerabilities were found in the popular Squid caching proxy, including request/response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846), denial of service in HTTP Digest Authentication (CVE-2023-46847), and denial of service in FTP (CVE-2023-46848).
Google is one of the most significant technology search engines in the world and an invaluable tool for users seeking to find information and answers to questions that they have efficiently. But now, Google has decided that it is time to test a new feature in its widely used Chrome browser by hiding IP addresses. By sending these connections from the browser through a proxy server first, the remote website only sees the IP address of the proxy server, not the device (phone, tablet, desktop, etc) from which the browser is being run.
Linux, renowned for its robust security features and flexibility, is a popular choice among enterprises for carrying out critical functions and tasks. In the evolving landscape of cybersecurity, managing a Linux environment requires a comprehensive approach encompassing security measures and effective compliance management.
With digitization conquering businesses, maintaining data and network security health standards and providing the best experience to clients and end users is essential. Today's networks are, for the most part, comprised of Linux and Windows-based environments. Businesses with data centers often prefer Linux networks, as they are good at scalability, security, customizations, consistency, and flexibility.
Docker containers provide a convenient way to deploy data management software. However, securing Docker containers that run sensitive data workloads requires careful configuration. Docker's lightweight container technology has become popular in current cybersecurity trends. Docker runs all applications, including databases, data pipelines, analytics tools, and other data management software.
Designing, developing, or managing a website requires a lot of effort. Fortunately, with modern open-source website builders and free online resources, even beginners can launch professional and secure websites. This article will discuss the basics of creating a website, including the technologies involved, best practices, and the best network security toolkits to implement.
Network applications are most effective at communication when following the client-server model. Programming these services allows organizations to configure codes to meet business needs.
Understanding and utilizing software security has become paramount in today's interconnected digital landscape. Computer security news constantly warns of newly evolving network security threats, which means that organizations must implement the most comprehensive testing and security practices to ensure employees are secure. With an open-source nature and robust capabilities, Linux has the ideal cloud security framework for conducting thorough software security patching and testing.
Linux proxy servers are essential for individuals and organizations looking to enhance their online privacy, data, network security, and browsing experience. In this comprehensive article, we will explore the concept of proxy servers, discuss the advantages of using a Linux proxy server, dive into the risks associated with their usage, highlight Squid as an efficient and user-friendly Linux proxy server, and provide step-by-step instructions on how to set up the HTTP proxy on Linux.
When dealing with a system crash due to a kernel panic, it is crucial to leave the “panic” to the kernel and focus on troubleshooting in a calm, structured way. This approach will help you get things running smoothly in less time and minimize stress and headaches in the process.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.