Linux Security - Main Page

Have a question or want to show off your project? Post it! No Registration Necessary.  Now with pictures!

Linux Security Security issues specific to all flavors of Linux operation systems
Web, RSS and Social Media interface to
There are 9046 individual articles here that are part of 1462 discussions
Please see below the list of the most recent and the best rated articles in Linux Security

The most recent discussions

Cloud Ace Technologies is offering Implementation Services on Cloud Comput...

October 17, 2016, 9:55 am

An organization often maintains private data that needs to be secured and p rotected from online theft. McAfee Encryption Solution Providers secures yo ur data from loss or theft with a fast endpoi... Read more »

yet another IP blocklist (mine!)

October 3, 2016, 3:42 pm

Hi - I am maintaining a brute-force attack source IP blocklist at - maybe of use to others. Entries have a 48 hour expiry. Contains actual ss... Read more »

Residential Proxy Provider

March 11, 2016, 8:15 am

I've produced a 10-city demonstration video in which I showcase 10 differen t U.S. cities and the types of ip address that I have available for them he re: Read more »

2/20/16 Linux Mint downloads compromised

February 21, 2016, 4:48 am Quotes: Beware of hacked ISOs if you downloaded Linux Mint on February 20th! We were exposed to an intrusion today. It was brief and it shouldn’t impact many ... Read more »

Web site analytics using bash and log files

December 3, 2015, 11:42 pm

Web site analytics using bash and log files: Andrew Read more »

Are ssh keys tied to a user or the originating machine?

November 21, 2015, 6:01 pm

I'm trying to better understand ssh. User foo on machine bar generates a keypair, and provides the public key to remote user dokes on machine shme . foo connects to dokes account at shme, and ... Read more »

Hackers' HTTP Requests

November 17, 2015, 10:10 pm

Hackers' HTTP Requests: Andrew Read more »

Hackers' IP Addresses

November 17, 2015, 10:09 pm

Hackers' IP Addresses: Andrew Read more »

portmap/rpcbind and tcpwrapper

October 1, 2015, 7:48 am

portmap/rpcbind is supposed to controllabl by tcpwrapper. I have a line rpcbind portmap: ALL:deny in /etc/hosts.allow after a line rpcbind portmap: : allow But then I can still run... Read more »

Residential ISP VPN Provider

September 21, 2015, 3:01 am

Hi, I am Preston John, better known as Profitvolt. I am a director @ where we offer the most affordable residential vpn services. Check us out for a trial today! Skype handle ... Read more »

risk of same fingerprint for ssh?

June 2, 2015, 1:02 pm

We have two clusters with 3 pairs of machines, cluster A consisting of a pair of application servers and a pair of MySQL servers, cluster B consisting of a pair of apache tomcat servers. Only the ... Read more »

[Samba 3.0.37] EnumPrinters memory consumption

May 18, 2015, 4:56 pm

Hello, there is a bug in Samba 3.0.37 (latest) in EnumPrinters rpc function (anonymous access), the bug is in parse_prs.c:398, we take control of length and source pointer of a memcpy, leading to ... Read more »

Useful bash scripts when securing your host

May 8, 2015, 3:30 pm

Hi, Some Linux scripts to analyze hacker attacks: Andrew Read more »

Announcing LinuxSA 1.0.0 Beta

April 20, 2015, 7:40 pm

We are pleased to announce the availability of Linux Security Assessment (LinuxSA) v1.0.0 Beta. LinuxSA is a tool for assessing the security settings of a Linux server or workstation. It is an autom... Read more »

Well that's pretty goddamned annoying

January 22, 2015, 3:10 am

Not sure how something this transparent to any algorithm is going to bump your google results, but whatever. It's always good to have another address to add as for spamblocking. (regarding this... Read more »

Opensource security

December 10, 2014, 5:53 am

Systematic updates to the core and main system components could be the strategy to win over the malicious dilemmas at the same game rules. Read more »

Promotional Fashional Reusable Cotton Canvas Bag

November 18, 2014, 7:43 am

Promoting with a purpose is easy with the Fashional Reusable Cotton Canvas Bag. It can be used as carrying things and equipped with features like carr ying handle, wide handle strap, washable, reu... Read more »

CFP: InfoSec2014 - Information Security and Cyber Forensics [Deadline Appro...

September 12, 2014, 12:49 pm

The International Conference on Information Security and Cyber Forensics (I nfoSec2014) Universiti Sultan Zainal Abidin (UniSZA) Kuala Terengganu, Malaysia October 8-10, 2014 Read more »

Virtual Private network over 4 different hosts

July 17, 2014, 11:51 pm

Trying to form a virtual network over 4 hosts each in a different hosting p rovider. Is there any simple way to do it. Each of them has a single NIC an d public ip, my goal is to be able to have so... Read more »

Improved Random Bit Generator

July 15, 2014, 11:57 pm

A POSIX C implementation of a digital non-deterministic RBG can be downloaded from Replace your insecure math-based RBG. Read more »

Click here for other recent discussions »

The best rated discussions


Write protection on SD cards

Most SD flash cards do have a little plastic thing for write protection. As far as I understand this is not connected to the electronics of the card but rather informs the card reader which in turn... Read more »


Web site analytics using bash and log files

Web site analytics using bash and log files: Andrew Read more »