Now, in this short series of articles, I'm going to delve deeper into Linux security and discuss protective measures such as VPN systems and tripwire. Even though I'm aware of the many different security analysis tools out there, I'm not experienced . . .
Now, in this short series of articles, I'm going to delve deeper into Linux security and discuss protective measures such as VPN systems and tripwire. Even though I'm aware of the many different security analysis tools out there, I'm not experienced in every one of them. I will be, however, covering the tools that have been successful for me. And I'm adding new tools all the time.

In some cases, I've picked from the most popular tools available. Other times I've selected options that clearly illustrate the points I'm trying to make. In any given instance, there may be better choices for a task, but the tool I select will certainly get the job done. I'm an advocate of the "use what you want to accomplish the task" philosophy

Before I get to the actual tools, however, I need to put on a different hat ... a black hat.