Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore the basics of intrusion detection and the steps necessary to configure a host to run the snort network intrusion detection system, explain how you can customize your LinuxSecurity advisories to make staying informed of the latest updates simple and convenient, and offer advice on how you can improve PHP security to protect your web server and web applications from attacks and compromise. Have you customized your LinuxSecurity advisories based on the distro(s) you use?

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Network Intrusion Detection Using Snort 

Learn the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.
13.Lock StylizedMotherboard

Learn more about network intrusion detection using snort

Keeping Your System Secure Is Easier than Ever with LinuxSecurity Customized Advisories!

LinuxSecurity makes staying informed of the latest updates simple and convenient by tracking security advisories for 13 popular distros and offering the ability to create a user profile and customize your advisories based on the distro(s) you use. Learn how you can customize your advisories now.
32.Lock Code Circular

Learn more about keeping your system secure is easier than ever with linuxsecurity customized advisories

A Linux Admin's Getting Started Guide to Improving PHP Security 

Learn how you can configure and run PHP securely to mitigate the risk of attacks and compromise, secure web applications, protect user privacy and maintain a secure and properly functioning Linux web server.
Php Best Practice

Learn more about getting started with php security