linux security
-
Xubuntu website hacked, spreading cryptocurrency malware disguised as download package
the official xubuntu site was hacked, spreading cryptocurrency malware via the xubuntu-safe-download.zip file, targeting users who recently switched from windows 10 to linux.
-
5 ways to improve Linux user account security
the first and most important step to secure linux servers and systems is to prevent unnecessary access by malicious parties. proper user account control is one of many ways to increase the security of your system.
-
Linux kernel vulnerability exposes Stack memory, causing local data leak
the way the researcher tells an international has just disclosed information about a relatively serious vulnerability that exists in the linux kernel, which can be exploited to leak data and act as a bridge. effective coupling for deeper penetration into victim systems.
-
The Linux vulnerability series is more than '15 years old', allowing hackers to hijack root privileges
vulnerabilities are currently being tracked with identifiers cve-2021-27365, cve-2021-27363, and cve-2021-27364.
-
How to use the last command in Linux
want to know who, what time and which device to access your linux computer? please read the following article.
-
20+ essential Linux security commands
here are some of the most important security commands for everyday work on linux systems. if you're interested in security issues on your linux system, don't ignore these helpful security commands.
-
How to secure Linux Ubuntu with two-factor authentication
today the battle between hackers and information security experts is going on. according to a study by the bureau of labor statistics, the expected growth rate for the information security industry is much higher than all other industries. as innocent bystanders, we have a number of measures that
-
Protect Linux computers with Iptables
linux is one of the operating systems that runs faster and has a reputation for more security functions than other operating systems, but that doesn't mean it can be completely secure. so the best way is to do some other security methods. our suggestion is to use a firewall. there are several