security testing

7 Linux Distros for Security Testing

Linux is often talked about when it comes to security. With this OS, you can choose from a multitude of distributions (distros) to lock down your computer or device, but that’s just ...
Security Boulevard
Configuring AWS Linux Servers With LDAP

Configuring AWS Linux Servers With LDAP

A significant number of servers in the AWS® cloud run on Linux®. So, the pairing of an open source OS and authN protocol makes sense. The post Configuring AWS Linux Servers With ...
Check Point cloud

Check Point Aims to Expand Reach of Cloud Service

Check Point Software Technologies this week previewed additional capabilities for its Infinity Next cloud service that will be added this year, including support for Linux platforms and a raft of internet of ...
Security Boulevard
Sync AD with Linux

How to Make Your Active Directory Work with Linux Devices

Linux devices struggle to integrate with Active Directory. However, there are ways that organizations can make Active Directory work with Linux devices. The post How to Make Your Active Directory Work with ...

USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop on ...
Sync AD with Linux

Sync AD with Linux

| | AD Integration, Linux
Although it’s possible to sync Active Directory with Linux systems, this can be a difficult and time consuming undertaking. The post Sync AD with Linux appeared first on JumpCloud ...
Do you use JumpCloud Policies & Commands? | JumpCloud Customer Story

Set Policies for Windows, Mac, and Linux systems

Microsoft Active Directory® only focused on Windows policies and ultimately left Mac and Linux device management up to IT admins - until now. The post Set Policies for Windows, Mac, and Linux ...
NetworkMiner + Cerberos

Extracting Kerberos Credentials from PCAP

NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...
Sudo Read This Warning About LPE Bug in Sudo

Sudo Read This Warning About LPE Bug in Sudo

The Sudo command can give you root access when it shouldn't. Sky falling? ...
Security Boulevard

TSC Frequency For All: Better Profiling and Benchmarking

Have you ever tried using LLVM’s X-Ray profiling tools to make some flame graphs, but gotten obscure errors like: ==65892==Unable to determine CPU frequency for TSC accounting. ==65892==Unable to determine CPU frequency ...