Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we examine some best practices to prevent your Joomla website from getting hacked by cyberattackers in 2022.

We also dive deeper into the topic of keylogging in Linux in Part 2 of our Complete Guide to Keylogging in Linux series.

We're currently in the process of redesigning the Security Dashboard section of our site for an enhanced user experience, and this week you have the opportunity to get involved and help us better understand how our site can best meet your needs by completing a brief time-sensitive survey. Thank you in advance for your time and input!

Yours in Open Source,

Brittany Signature 150

LinuxSecurity Dashboard Survey: Help Us Design the Next Generation of LinuxSecurity!

1.Penguin LandscapeWe’re in the process of redesigning the Security Dashboard section of our site for an enhanced user experience, and need your input! This is your chance to get involved - help us better understand how our site can best meet your needs by completing a brief time-sensitive survey.

Take the Survey Now>

Complete Guide to Keylogging in Linux: Part 2

24.Key CodeIn Complete Guide to Keylogging in Linux: Part 1, we covered how a keylogger can be written for Linux, by reading events directly from keyboard device. Now, we cover a slightly different technique for keyboard event capture.

Learn more about complete guide to keylogging in linux part 2

Joomla Security in 2022 - Best Practices To Secure Your Website

19.Laptop BedLooking to secure your Joomla website? Here are some best practices to prevent your Joomla website from getting hacked by cyberattackers in 2022.

Learn more about joomla security in 2022 best practices to secure your website