article thumbnail

Securing Linux Policy

Tech Republic Security

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. From the policy: DEVELOP TEMPLATES BASED ON.

Linux 134
article thumbnail

Debian, the grandaddy of Linux operating systems, turns 30

TechSpot

The Linux distro was established by Ian A. Murdock created Debian from scratch, providing the guidelines needed to govern upgrades, installation procedures, and. On August 16, the Debian blog announced that the project is now officially 30 years old. Murdock in 1993, with a message sent to the comp.os.linux.development newsgroup.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

USPTO denies OpenAI’s attempts to trademark ‘ChatGPT’ and ‘GPT’

GeekWire

OpenAI’s brand guidelines currently prevent partners and developers from using “GPT” in their product or app names “because it confuses end users.” ” We’ve contacted OpenAI for comment on the USPTO rulings. News of the “GPT” trademark rejection surfaced on the news site Tech Startups on Feb.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Once we’ve created guidelines and templates for deploying secure devices and operating systems, we’re finished, right? Red Hat offers OpenSCAP , can be used to scan Linux hosts for compliance but doesn’t scan Windows hosts. Monitoring Changes to Identify Attackers or Rogue Employees.

article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. See this list of guidelines from Richard Bejarano. Hopefully I’ve managed to find something useful for someone. Networking. Programming.

Linux 90
article thumbnail

Installing the VMware Horizon Client on Fedora 27

Scott Lowe

In this post, I’ll outline the steps necessary to install the VMware Horizon client for Linux on Fedora 27. Based on information found here and here , I took the following steps before attempting to install the VMware Horizon client for Linux: First, I installed the libpng12 package using sudo dnf install libpng12.

Vmware 60
article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

If your organization handles either of these sensitive data types, you must follow guidelines to keep your systems secure. The Linux Audit system is a great solution. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. Compliance Scanning.