Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Ten Linux commands you canít live without  03 September 2009 
Source: Ethiopian Review - Posted by Benjamin D. Thomas   
"To be a good administrator, you have to know the command line. Why? Well, with Windows there are times when the command line is the only thing that can save your skin. With Linux, the command line is vast, reliable, flexible, fast Ö I could go on and on. And of the 2119 possible commands from the /usr/bin directory (in Mandriva Spring 2008) and the 388 possible commands from /usr/sbin/, a few are indispensable."
Linux Kernel Security Wiki  13 January 2009 
Source: James Morris - Posted by Ryan W. Maple   
James Morris posted the following over on his blog: This is to announce a kernel security subsystem wiki, supported by the kind folk at It's intended for use by community developers and users of kernel security projects. So far, there are sections on working with the security-testing git repo, a listing of various kernel security projects, and an events page. If there's something you'd like to see or change on the wiki (particularly if it relates to your own project), create an account and make it so. Pretty interesting, click through for the link to the Wiki then go contribute!
Chrooted SSH/SFTP On Fedora 7  25 October 2007 
Source: HowTo Forge - Posted by Eckie Silapaswang   
This document describes how to set up a chrooted SSH/SFTP environment on Fedora 7. The chrooted users will be jailed in a specific directory where they can't break out. They will be able to access their jail via SSH and SFTP.

This is a good howto for those wishing to experiment with chroots, SFTP, and SSH configurations in an attempt to gain reliable, secure connections. What home-brewed chrooting tips have you come up with over the years?

The (Practically) Ultimate OpenSSH/Keychain Howto  19 September 2007 
Source: Enterprise Networking Planet - Posted by Eckie Silapaswang   
Even though we are all security aware and use ridiculously strong passwords (I once used the lyrics to three of my favorite songs along with a few exclamation points and parentheses here and there), when one has to navigate through a series of networks and hop around servers, constantly typing in your SSH passwords can start to contribute to that carpel tunnel. This is pretty much like being the janitor with the huge keyring of identical looking keys. Read on for a concise article of setting up OpenSSH and your keyring to make life just a little more manageable while keeping things safe - isn't that what we're all looking for?

Disable ldirectord checks  17 September 2007 
Source: MDLog:/sysadmin - Posted by Eckie Silapaswang   
ldirectord is a daemon to monitor and administer real servers in a LVS cluster of load balanced virtual servers. ldirectord is typically used as a resource for heartbeat , but can also run standalone from the command line.

Read on for an interesting tidbit on configuring this service to properly turn off checks for a specific service - this will come in handy for testing and debugging purposes to make sure you're not getting any alerts when you don't intend to.

Filtering PDF-/XLS-/Image-Spam With ClamAV (And ISPConfig) On Debian/Ubuntu  25 July 2007 
Source: HowtoForge - Posted by Eckie Silapaswang   
In our never-ending battle against spam, our opponents have decided to play the espionage route and disguise themselves as .pdf and .xls files. This shady tactic has become a trend of its own, resulting in all the recent postings of spam battling notes. This most recent article provides a how-to on setting up ClamAv to counter these new spam signatures. Get this before THEY come running wild on YOU!

Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch  28 June 2007 
Source: HowtoForge - Posted by Eckie Silapaswang   
Ever come back from a vacation only to be SWAMPED with email? The interesting part is that just applies to you - imagine what email service providers must go through as far as maintenance! Read on for a nice how-to on configuring and monitoring Postfix with the least hassle. Use graphs to gain a visual understanding of your traffic and cron jobs to report daily to you. Remember, this is one area where we could potentially let email through with a 'Click Here!' link that could lead to many, MANY more problems for everyone.

Introducing Google's online security efforts  23 May 2007 
Source: Google - Posted by Benjamin D. Thomas   
Online security is an important topic for Google, our users, and anyone who uses the Internet. The related issues are complex and dynamic and we've been looking for a way to foster discussion on the topic and keep users informed. Thus, we've started this blog where we hope to periodically provide updates on recent trends, interesting findings, and efforts related to online security. Among the issues we'll tackle is malware, which is the subject of our inaugural post.

Companion textbook on IPv6 advanced protocols  27 March 2007 
Source: - Posted by Benjamin D. Thomas   
IPv6 is now in its deployment stage after having been in development with the IETF for over 10 years. KAME is the widely accepted reference implementation for IPv6 and IP security protocols developed on multiple variants of the BSD operating systems. This new book tackles more high level topics than its predecessor, IPv6 Core Protocols Implementation written by this same author team.

SELinux by Example  15 March 2007 
Source: - Posted by Benjamin D. Thomas   
The 14 chapters are in turn broadly divided into three parts with the first part containing chapters which provide an overview of SELinux, its background and the concepts behind it. The second part contains 7 chapters which are most useful for SELinux policy writers and contain detailed explanation of the syntax used in writing the policy files. It is the third part, "Creating and Writing SELinux Security Policies" which could be most put to use by system administrators.

<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 444


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.