A new Linux vulnerability known as 'Dirty Pipe' allows local users to gain root privileges through publicly available exploits. Today, security researcher Max Kellermann responsibly disclosed the ...
A vulnerability in the Linux sudo command has been discovered that could allow unprivileged users to execute commands as root. Thankfully, this vulnerability only works in non-standard configurations ...
Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. The latest ...
You don't need to reinstall your whole operating system just because you forgot your Linux login. It's actually pretty easy ...
Of all the Linux commands, rm is notorious. It's easy to completely wipe out your system with one mislaid rm command as root. I knew not to, but I ran that command on purpose anyway. Here's why.
There was a time when, to use a computer, you merely turned it on and were greeted by a command prompt. Nowadays, most operating systems offer a security model with multiple users. Typically, the ...
In the Linux Journal article “Implementing Encrypted Home Directories” (August 2003), I described how to encrypt home directories transparently. This article describes how to implement another ...
A newly discovered vulnerability in the Linux kernel allows attackers with access to a system to extend their rights and take over the system. Working test exploits for the kernels of current Linux ...
In the comments on my recent posts about installing Linux on a netbook for a novice user (see my recommendations and my own results), someone mentioned that figuring out the disk partitioning was very ...