article thumbnail

How to View Your SSH Keys in Linux, macOS and Windows

Tech Republic Security

If you're not sure how to view your SSH certificates, this article walks you through the steps on Linux, macOS and Windows. The post How to View Your SSH Keys in Linux, macOS and Windows appeared first on TechRepublic.

Linux 498
article thumbnail

IBM extends z15 mainframe family, intensifies Linux security

Network World

IBM continued to reshape the mainframe with an eye toward further integrating it within hybrid clouds and securing Linux -based workloads. To read this article in full, please click here On the hardware side, IBM rolled out two entry-level, 19” single-frame, air-cooled platforms, the z15 Model T02 and LinuxONE III Model LT2.

IBM 537
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 essential Linux tools for network and security pros

Network World

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. To read this article in full, please click here There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.

Linux 514
article thumbnail

How to enforce password complexity on Linux

Network World

Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading. The files that contain the settings we're going to look at will be: To read this article in full, please click here

Linux 482
article thumbnail

First step to becoming a hacker: Linux!

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. This new book from no starch press was written with people like you in mind.

Linux 420
article thumbnail

Tracking down library injections on Linux

Network World

While not nearly commonly seen on Linux systems, library (shared object files on Linux) injections are still a serious threat. Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ]. To read this article in full, please click here First, a little background. [

Linux 397
article thumbnail

Linux security: Cmd provides visibility, control over user activity

Network World

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. To read this article in full, please click here Provided by a company of the same name, Cmd focuses on cloud usage.

Linux 405