Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, ...
For most Internet users, gone are the days when you backed up files to an external drive or home server. Instead, most of us rely on cloud storage to secure sensitive files, like banking information, ...
Princeton, NJ, July 13, 2010 – Cloud Linux Inc., an innovative software company dedicated to serving the needs of hosting service providers, today announces the release of SecureLVE™, an extension of ...
In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for security ...
I've been using Secure Shell (SSH) for decades. With this remote login tool, I can rest assured my remote machines accept logins securely and efficiently. At the same time, I also understand nothing ...
Business IT is heading for the cloud. But, as the saying goes, "The cloud is just other people's computers." It's more complicated than that. SUSE knows that, and with its recent release of its ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
If you’re still relying on a single firewall, you’re leaving the door wide open for attackers. A cloud DMZ (demilitarized zone) closes that door. It creates an isolated buffer between your business ...
Creating a new remote with rclone. How to sync your Linux GUI-less server to your cloud service with rclone Your email has been sent Linux servers are powerful and flexible. With a modern GUI, things ...