I've been using Secure Shell (SSH) for decades. With this remote login tool, I can rest assured my remote machines accept logins securely and efficiently. At the same time, I also understand nothing ...
This article is excerpted from The Official Ubuntu Book by Benjamin Mako Hill, Jono Bacon, Corey Burger, Jonathan Jesse and Ivan Krstic, copyright Prentice Hall ...
The truth behind Linux's security claims.
ORLANDO, Fla. (SUSECon 2012) — Sept. 18, 2012 — Centrify Corporation, the leading provider of security and compliance solutions that centrally control, secure and audit access to cross-platform ...
Software maker Trustix AS this week formally unveiled a deal with IBM to jointly market and sell its secure Linux software in the U.S. on hardware from Big Blue. Trustix, of Trondheim, Norway, ...
Fifteen years ago, you weren’t a participant in the digital age unless you had your own homepage. Even in the late 1990s, services abounded to make personal pages easy to build and deploy—the most ...
Setting up a secure server isn’t necessarily for the faint of heart. To make it easier for IT administrators, Guardian Digital Inc. has released (download PDF) EnGarde Secure Linux Version 1.2, ...
IBM has demonstrated prototype security technology that lets people load a cloud-hosted Windows or Linux operating system onto a client PC using a USB stick. IBM designed the Secure Enterprise Desktop ...
It’s been an apocalyptic year for Linux security, with a sophisticated Trojan and security holes over 20 years old. The Shellshock bug left Linux desktops and servers wide open for anyone to own.