News

Some days, it doesn't rain, it pours. That's the case with Linux today. Not one, but two serious security holes have recently been exposed. First, there was a systemd bug which could easily knock out ...
As someone who has traveled the bug-riddled Linux road countless times, let me tell you that invoking root-level access for ...
Maybe buying a FDE (Full Disk Encryption) hard drive is not an option for you right now, but that doesn't mean you need to compromise on your Linux file system security.linux.com has an article on how ...
Blindly executing commands can also reinforce bad habits, preventing users from learning the reasoning behind each step.
In the Linux environment, the file system acts as a backbone, orchestrating the systematic storage and retrieval of data. It is a hierarchical structure that outlines how data is organized, stored, ...
Hackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent repository of malicious tools that work on many Linux distributions. A Bring ...
File systems and UUIDs have a special relationship on Linux systems. What are these very long identifiers and how can you view the connections between them and disk partitions? The /etc/fstab file is ...
There are a number of Linux commands that will display file system types along with the file system names, mount points and such. Some will also display sizes and available disk space. The df command ...
This results in the attacked system opening a shell with root privileges. The issue, tracked as CVE-2016-4484, was discovered by Spanish security researcher Hector Marco, who also found last year that ...