­Three strategies for better backups
Linux Magazine » Security
by
7M ago
To protect your data, you need to do more than schedule regular backups. Here are three often overlooked strategies that can help make your backups more accessible, secure, and reliable ..read more
Visit website
A simpler packet filter
Linux Magazine » Security
by
8M ago
Filter rules for firewalls can be tricky. As the successor to iptables, nftables simplifies the process of creating and maintaining firewall rules ..read more
Visit website
Integrating Google Authenticator with SSH logins
Linux Magazine » Security
by
9M ago
The Google Authenticator PAM module allows you to use time-based Google Authenticator passwords with various Linux services, including SSH ..read more
Visit website
Locking down the Thunderbolt interface
Linux Magazine » Security
by
1y ago
The Thunderbolt interface supports extremely fast data transfer rates, but be careful about what you plug into your port, because Thunderbolt devices access memory directly. We'll show you some Linux tools for locking down your Thunderbolt interface ..read more
Visit website
Detect attacks on your network with Maltrail
Linux Magazine » Security
by
1y ago
Maltrail is a lightweight analysis tool that examines network traffic and raises the alarm if it detects suspicious access or dubious name resolution ..read more
Visit website
Deleting metadata from files
Linux Magazine » Security
by
1y ago
Digital camera images often reveal personal information embedded in metadata. Several Linux tools let you remove unwanted metadata to help preserve your privacy ..read more
Visit website
Data encryption with SiriKali
Linux Magazine » Security
by
2y ago
SiriKali encrypts files and directories with just a few mouse clicks, without the inefficiency of fixed-size containers ..read more
Visit website
Protecting your private key with the OpenPGP smartcard
Linux Magazine » Security
by
2y ago
Improve communication security with GnuPG and the OpenPGP smartcard ..read more
Visit website
Securing the Linux kernel with lockdown mode
Linux Magazine » Security
by
2y ago
Lockdown mode makes your Linux system more secure and even prevents root users from modifying the kernel ..read more
Visit website
Secure decoupled messaging with DANE and the TLSA resource record
Linux Magazine » Security
by
2y ago
Decoupled application design gets in the way of secure communication, but a little known feature of DNS can provide message security ..read more
Visit website

Follow Linux Magazine » Security on FeedSpot

Continue with Google
Continue with Apple
OR