Read more about Linux
Bookmark and Share
  • Critical Bash bug opens Unix, Linux, OS X systems to attacks

    25.09.2014

    The Bash "shellshock" flaw (CVE-2014-6271) was discovered last week by Unix/Linux specialist Stephane Chazelas, and its existence was made public on Wednesday.

  • Kali NetHunter turns Nexus devices into portable hacking tools

    24.09.2014

    Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community member “BinkyBear” have created another great tool for pentesters: NetHunter.

  • eBook: User Mode Linux

    22.09.2014

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels.

  • Guide: Introduction to Linux

    08.09.2014

    This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.

  • Checklist: Should I use Linux?

    04.09.2014

    For those who aren’t sure how to evaluate the efficacy of Linux for themselves, we have created a simple guide that can walk you through the criteria you need to look at.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //