Red Hat: Benchmarking nftables
[…] To me, the most prominent information to draw from this little experiment is that similar iptables and nftables setups are comparable in performance. Yes, nftables is usually a bit behind, but...
View ArticleLinux.com: 4 Best Practices for Web Browser Security on Your Linux Workstation
There is no question that the web browser will be the piece of software with the largest and the most exposed attack surface on your Linux workstation. It is a tool written specifically to download and...
View ArticleTechRepublic: Linux’s X.org server is vulnerable. Here’s how to stay safe.
The Linux operating system is known for security. From the bottom up, Linux was designed to be a platform to be trusted. There is, however, one weak link in the chain. This weakness didn’t just appear,...
View ArticleMake Tech Easier: 5 Must-Have Security Tools for Your Linux PC
Some people are, rather falsely, under the impression that just because they use Linux they don’t need to worry about security. Sure, Linux doesn’t suffer from the same types of security issues and...
View Articler/linux: Is desktop Linux completely missing the point when it comes to...
And so I remembered something I’ve considered many times before regarding root and security in Linux (but also other operating systems): I actually don’t care about root access. Sure, it would be...
View ArticleLinux Foundation: Linux workstation security checklist
This document is aimed at teams of systems administrators who use Linux workstations to access and manage your project’s IT infrastructure. If your systems administrators are remote workers, you may...
View ArticleAdvanced Browser Security with Firejail – A Hands On Guide
Advanced Browser Security Many people believe that browser security is difficult. I created this guide as an overview of Firejail sandboxing technology. The goal is to show you that security can be...
View Article