Around 2 years ago I wrote an article about fail2ban. Fail2ban is an intrusion prevention framework written in the Python programming language. It is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally (such as, iptables or TCP Wrapper). Fail2ban’s main function is to block selected […]
How to scan Linux for vulnerabilities with lynis
Article by Dan Nanni first published on xmodulo.com As a system administrator, Linux security technician or system auditor, your responsibility can involve any combination of these: software patch management, malware scanning, file integrity checks, security audit, configuration error checking, etc. If there is an automatic vulnerability scanning tool, it can save you a lot of […]
The Importance of Securing a Linux Web Server
Today I present a really interesting article by Scott Miller first published on Infosecinstitute.com. With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable […]
An Open Source Board Game about Network Security: d0x3d
[d0x3d] is a boardgame designed for informal security education, this is an incredibly fun game that proactively teaches about network integrity and the security of information. Inspired by Forbidden Island, d0x3d! and is released under an open source license. It requires only a small number of people but packs a very powerful lesson. Incorporating it […]
An introduction to security models in Linux
Today I’m glad to republish an interesting article of Adrian Stolarski first published on Infosec, a great source of information about security. It’s a good summary of the different type of security models that you can have in a Linux system, focused on SELinux, and if you are interested in this topic, be sure to take a […]