Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore to topic of anti-debugging in Part 1 of our Hacker's Corner: Complete Guide to Anti-Debugging in Linux series, and then dive deeper in Part 2 which focuses on self-modifying code.

We also discuss which browser is best for online privacy and security. Hope you enjoy!

Yours in Open Source,

Brittany Signature 150

Hacker's Corner: Complete Guide to Anti-Debugging in Linux - Part 1

10.FingerPrint LocksWhat good is a keylogger (or any such tool, for that matter), that is reversed using a debugger within minutes? Let's level up just a little bit, and try to make malware analyst's job slightly more involved.

Learn More>

Which Browser is Best for Online Security?

32.Lock Code CircularOne of the easiest ways to maintain privacy online is to download a secure and private browser. The Tor browser is famous for offering complete anonymity, or the closest thing possible, on the internet. However, there are many other great browsers with a focus on security without some of the flaws of Tor.

Learn More>

Hacker's Corner: Complete Guide to Anti-Debugging in Linux - Part 2

11.Locks IsometricPatternThis article dives deeper into the topic of anti-debugging in Linux, focusing on the process of self-modifying code.

Learn More>