security

How to Change the SSH Port in Linux

By default, SSH listens on port 22. Changing the default SSH port adds an extra layer of security to your server by reducing the risk of automated attacks.
Instead of changing the port is much simpler and secure to configure your firewall to allow access to port 22 only from specific hosts. Learn More

Containers or virtual machines: ​Which is more secure? The answer will surprise you

Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs.

James Bottomley, an IBM Research Distinguished Engineer and top Linux kernel developer, writes:

Shell Scripting and Security

Today the online world is quite a bit different, and a quick glimpse at the news demonstrates that it's not just global, but that bad actors, as they say in security circles, are online and have access to your system too. The idea that any device that's online is vulnerable is more true now than at any previous time in computing history.

How Red Hat Is Dealing With the Spectre of the CPU Meltdown

By now there's probably no one who follows tech even a little who hasn't heard about Meltdown and Spectre, two related security vulnerabilities that differ from garden variety security issues because they're hardware and not software vulnerabilities. They're also notable because they're built into just about every CPU that's been manufactured for decades.Read More.

Subscribe to RSS - security