1.Penguin Landscape Esm W900

A memoir written by Dave Wreski, Guardian Digital CEO, Founder of LinuxSecurity.com and author of the Linux Security Quick Reference Guide and Linux Security HOWTO.

Quick Ref GuideIt was in 2000, at a time when the whole dot-com thing was going on, Linux and the Internet were still in their infancy and cybersecurity was really just getting started. I had started Guardian Digital just a year before and we were traveling around the country to trade shows. The Linux Security Quick Reference Guide was an idea by one of my buddies, where I then implemented it.

LinuxSecurity was always a way for me to give back to the community, and this "quick reference card" that sysadmins can use to refer to many of the popular security commands that are necessary for a Linux system was just part of that open source spirit of giving. It also quickly became part of the Linux Documentation Project as one of the few security documents that existed at the time, with the other being the Linux Security HOWTO that I wrote.


It was physically printed on a heavy yellow cardstock, then distributed from our booth at a Linux tradeshow in San Diego, California. I believe we printed about 2500 of them, and had just a few left by the end. I believe there's one small typo that made it through to the printed version, but it otherwise was really successful and everyone loved it. Many of the commands are still useful, but lots of them are relics of a much older time around Linux.

Perhaps you were a Linux user then and remember? Were you at one of the Linux trade shows of the late 1990s and early 2000s and have a story to share?

Are you interested in helping develop and update this resource with my team and I? If so, please contact us or email our editors at This email address is being protected from spambots. You need JavaScript enabled to view it..

We look forward to hearing from you! Please share this resource with your Linux-using friends, family or colleagues who may find it helpful, or who may appreciate the interesting glimpse it provides into the evolution of Linux security over the past two decades.