Lately, internet users (read: everyone) are in a bit of a frenzy regarding online security. Antivirus and antimalware software is soaring in popularity. There are a million VPN apps for your smartphone (most of which don’t work). And everyone is telling you to stop what you're doing and subscribe to one. But why do you ... Read more Do You Need A VPN When Running Linux?
We use Linux for many reasons. Security is just one of them, but it’s undeniable that Linux is more secure than other operating systems. Securing our data is especially important to us, since our devices contain a lot of our personal information. Without the requisite protection, we open ourselves up to identity theft. Choosing the ... Read more Choosing The Right VPN As A Linux User
To improve security in our environment many times we have to blacklist certain modules from getting loaded in our setup to avoid any security leak. The provided procedure is tested with Red Hat Enterprise Linux 7 Before starting with the blacklisting let us validate our usb module is properly loaded # lsmod | grep -i ... Read more How to blacklist or disable USB module in Red Hat 7
Now we hear many times from most of the people around us claiming that Linux is much more secure than Windows or Linux is very secure. But what are the things in Linux that makes it secure than Windows or any other Operating System. Here I will try to throw some light on some of ... Read more Why is Linux considered more safer than windows or any other OS ?
ALSO READ: Things you must keep in mind before you upgrade or downgrade kernel in Linux Below are the list of topics covered in this article: What is kdump? Memory Requirements for KDUMP Configure kdump The Basic Settings Tab The Target Settings Tab The Filtering Settings Tab The Expert Settings Tab Configure kdump using CLI ... Read more How to configure and analyze kdump for kernel panic in Red Hat Linux 6
It is not possible for me to tell you with all the possible features because that is out of my knoweldge level but I will try to put everything I know which can be used to make sure that your Linux server security is not compromised. 1. hosts.allow and hosts.deny These two files are explicitly ... Read more 15 tips to enhance security of your Linux Server