How to learn tips and tricks - Page 3.4

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Learn Tips And Tricks HOWTOs

3 Different Ways to apply Linux Kernel Security Patches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We know that the most effective way to strengthen system security and protect against any cyber threat is to keep our system updated with the latest OS and application software patches. For Linux the kernel upgrades and security patches require a system reboot, hence it is hard to maintain the OS safe. Here we are going to see how to update the Linux kernels, without a reboot.

Commands and Setting for Managing User Accounts on Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.

Harnessing the eBPF Verifier

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

During my internship at Trail of Bits, I prototyped a harness that improves the testability of the eBPF verifier, simplifying the testing of eBPF programs. My eBPF harness runs in user space, independently of any locally running kernel, and thus opens the door to testing of eBPF programs across different kernel versions.

How To Scan for Cross-Site Scripting Vulnerabilities in Websites & Web Apps with Pwn XSS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Pwn XSS is a powerful tool that is commonly used by malicious hackers as well as security professionals today. The term "pwn" comes from "own", as in "to have power or mastery over (someone)." Pwn XSS is an open source cross site scripting vulnerability scanner made in python 3.7. This tool is used to find vulnerabilities in websites and web apps that can be compromised and allow a hacker to exploit for malicious reasons. It can also be used by security professionals to test their own websites to be sure it's free from any cross-site scripting vulnerabilities, as well as cybersecurity students, learning about how cross-site scripting works, why it can be a potential security risk, and ideas for how security and protection against these attacks can be improved.

5 Simple Tips to Secure Your Linux Server

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux servers are the backbone of the modern Internet. Today, nearly every website and service that you can access through a web browser runs on a Linux distribution. Here we show you how you can secure your Linux server.