Despite appearing rather complex at first glance, the Linux terminal is a nifty tool for most tasks, be it installing new packages or troubleshooting the most obscure errors. That said, enabling root ...
A vulnerability in the Linux sudo command has been discovered that could allow unprivileged users to execute commands as root. Thankfully, this vulnerability only works in non-standard configurations ...
Two new vulnerabilities have been discovered in widely deployed Linux components that could allow unprivileged users to gain root access across popular distributions. The first is a local privilege ...
Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. The latest ...
There was a time when, to use a computer, you merely turned it on and were greeted by a command prompt. Nowadays, most operating systems offer a security model with multiple users. Typically, the ...
A newly discovered vulnerability in the Linux kernel allows attackers with access to a system to extend their rights and take over the system. Working test exploits for the kernels of current Linux ...
Security researcher Sebastian Krahmer has recently discovered that a previously known security flaw in the systemd project can be used for more than crashing a Linux distro but also to grant local ...
In the Linux Journal article “Implementing Encrypted Home Directories” (August 2003), I described how to encrypt home directories transparently. This article describes how to implement another ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results