article thumbnail

10 essential Linux tools for network and security pros

Network World

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.

Linux 201
article thumbnail

Microsoft gives Linux a security boost with these new attack detection tools

Tech Republic Security

Linux endpoint detection and response will help Microsoft Defender customers secure Linux servers and networks against security nasties.

Linux 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

First step to becoming a hacker: Linux!

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. To read this article in full, please click here

Linux 162
article thumbnail

How to install the Observium network discovery tool on Ubuntu Server 18.10

Tech Republic Data Center

Observium is a powerful network discovery/management tool that is open source, free, and ready to install on your Linux datacenter servers.

Tools 112
article thumbnail

First step to becoming a cybersecurity pro: Linux

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. Why Linux is important to security. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed.

Linux 113
article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

The post adds, "This is the first time the group has created a Linux binary. Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware's leaked source code." Both asymmetric and symmetric encryption make it impossible to decrypt files without the attacker's private key."

Linux 82
article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 113