Despite appearing rather complex at first glance, the Linux terminal is a nifty tool for most tasks, be it installing new packages or troubleshooting the most obscure errors. That said, enabling root ...
Logging in as the root user should never be done on Linux. Using the root account could lead to disaster. Sudo is the preferred method of gaining elevated privileges. When I first started using Linux ...
A vulnerability in the Linux sudo command has been discovered that could allow unprivileged users to execute commands as root. Thankfully, this vulnerability only works in non-standard configurations ...
There was a time when, to use a computer, you merely turned it on and were greeted by a command prompt. Nowadays, most operating systems offer a security model with multiple users. Typically, the ...
A new Linux NetFilter kernel flaw has been discovered, allowing unprivileged local users to escalate their privileges to root level, allowing complete control over a system. The CVE-2023-32233 ...
Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. The latest ...
In the Linux Journal article “Implementing Encrypted Home Directories” (August 2003), I described how to encrypt home directories transparently. This article describes how to implement another ...
A newly discovered vulnerability in the Linux kernel allows attackers with access to a system to extend their rights and take over the system. Working test exploits for the kernels of current Linux ...