Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we take a deep dive into what VPNs are, how they boost your online security against ransomware and other issues, and how to make the most of them as a business solution. 

We also provide an introduction to log files, log file analysis, and log file analysis tools and techniques for both novice and advanced users. Finally, we talk about configuring the Linux firewall with the firewall-cmd command.

Interested in learning about how to manage encrypted Linux devices across the entire organization? Join Garry McCracken CISSP, VP of Technology & CISO, WinMagic and Dave Wreski, Linux security expert and CEO of Guardian Digital for a webinar on Enterprise Linux Encryption Management for Businesses Wednesday October 12th at 2 PM EST. Get Your Spot Now!

Yours in Open Source,

Brittany Signature 150

13.Lock StylizedMotherboardIn this article, we talk about configuring the Linux firewall with the firewall-cmd command.

Learn more about does linux need a firewall how to configure the linux firewall with firewall cmd

Linux Log Analysis

19.Laptop BedThis article will serve as an introduction to log files, log file analysis, and log file analysis tools and techniques for both novice and advanced users.      

Learn more about linux log analysis

Business VPNs: Now More Important Than Ever

31.Lock DigitalRoomWe take a deep dive into what VPNs are, how they boost your online security against ransomware and other issues, and how to make the most of them as a business solution. 

Learn more about business vpns now more important than ever