Tag: security
-

TNS Linux SB00.3 Understand the Linux Command Line
Command-line environments are critical to administrators on any platform, especially Linux. Here’s how to get started. Modern operating systems, like Linux, macOS, and Windows, include efficient, aesthetically pleasing user interfaces, so it may seem odd to encourage administrators to return to the “old fashioned” command line. In reality, command-line environments are critical to administrators on…
-

6 Best Open Source IAM Tools in 2024
Explore the top open source IAM (Identity and Access Management) tools, their features and how they can enhance your organization’s security and access control. Identity access management (IAM) tools, crucial for cybersecurity, have become highly sought-after due to rising identity-related breaches. A Statista report revealed that 80% of global respondents experienced cyber breaches linked to…
-

How ACL Masks Let You Fine-Tune File Permissions
ACL masks let you set the maximum allowed permissions for a file on Linux. Find out what they mean, and why they’re so essential. Are you using Access Control Lists (ACLs) but are confused about the concept of masks? You’re not alone. Let’s dive into this important concept by taking a look at what they…
-

Critical Vulnerability Affecting Distros Allows for bootkits
Buffer overflow in bootloader shim allows attackers to run code each time devices boot up. Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they’re hard to…
-

The Most Deadly Linux Commands
Step away from the keyboard and consider your life choices verrrrry carefully right now.Welcome to the rogue’s gallery of lethal Linux commands.Many Linux commands offer no yes/no query before cheerily destroying everything that makes your life worthwhile.Which Linux commands should you treat like nuclear waste? Linux, an open source, advanced operating system, is hugely popular…
-

Tunnels with SSH Port Forwarding
If you are looking to create a encrypted tunnel from one Linux instance to another, the bet choice is SSH port forwarding. Secure Shell (SSH) has several really cool tricks up its sleeve, each of which offers a handy feature (wrapped in a comforting blanket of security) to help make your life a bit easier.…