Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we examine some best practices to prevent your Joomla website from getting hacked by cyberattackers in 2022.

We also dive deeper into the topic of keylogging in Linux in Part 2 of our Complete Guide to Keylogging in Linux series.

We're currently in the process of redesigning the Security Dashboard section of our site for an enhanced user experience, and this week you have the opportunity to get involved and help us better understand how our site can best meet your needs by completing a brief time-sensitive survey. Thank you in advance for your time and input!

Yours in Open Source,

Brittany Signature 150 Esm W150

LinuxSecurity Dashboard Survey: Help Us Design the Next Generation of LinuxSecurity!

1.Penguin Landscape Esm W233We’re in the process of redesigning the Security Dashboard section of our site for an enhanced user experience, and need your input! This is your chance to get involved - help us better understand how our site can best meet your needs by completing a brief time-sensitive survey.

Take the Survey Now>

Complete Guide to Keylogging in Linux: Part 2

24.Key Code Esm W234In Complete Guide to Keylogging in Linux: Part 1, we covered how a keylogger can be written for Linux, by reading events directly from keyboard device. Now, we cover a slightly different technique for keyboard event capture.

Learn more about complete guide to keylogging in linux part 2

Joomla Security in 2022 - Best Practices To Secure Your Website

19.Laptop Bed Esm W235Looking to secure your Joomla website? Here are some best practices to prevent your Joomla website from getting hacked by cyberattackers in 2022.

Learn more about joomla security in 2022 best practices to secure your website