article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. However, many Linux users make the same mistakes of believing that it’s enough just to have it on your computer and only that fact will make all threats simply disappear, when unfortunately the reality is quite different.

Linux 66
article thumbnail

User Account Review | Roadmap to Securing Your Infrastructure

Linux Academy

We spend so much time on other things — like managing firewall rules, system patching , analyzing report data, etc. Great news – as I’m writing this, I’m also working on a CompTIA CySA+ certification course here at Linux Academy to be released soon!). that user accounts are often a neglected topic. It’s fairly simple.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cloud Playground for Beginners: Navigating your first Server

Linux Academy

Welcome to Linux Academy’s Cloud Playground! Used basic Linux commands on that server. The great thing about this in-browser terminal is that it bypasses restrictions that corporate firewalls typically have, so you can learn on the job without restriction. By the end of this guide, you will have: Started an Ubuntu server.

Cloud 74
article thumbnail

Technology Short Take #77

Scott Lowe

Jeff Geerling has a great article on why he returned his 2016 MacBook Pro with Touch Bar ; it’s definitely worth a read, in my opinion. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Some people love it, others absolutely hate it.

Linux 60
article thumbnail

5 Reasons Why Ansible is the Best CM Tool Out There?

Cloud Musings

A software application has numerous moving parts, which, if not effectively maintained, will definitely affect the final quality and end user experience. It effortlessly integrates with any area of the IT infrastructure, be it provisioning virtual machines (VMs) or creating firewall rules.

Tools 94
article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. NixOS seems to be an interesting re-think of a Linux distribution.

Vmware 60
article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Cisco EPGs can be a physical server, a virtual machine, a Linux container, or even a mainframe. Microsegmentation is definitely a continuation or extension of the idea of segmentation.

Network 150