Intel recently disclosed two vulnerabilities that affect processors in most devices over the last 23 years. Here's how that affects you and what you can do about it.
This guide shows how to use dm-crypt in plain mode or with LUKS to encrypt your data disk, partition or file container.
This guide shows how to use the Elastic Stack (Elasticsearch, Logstash, and Kibana) to collect, log, and visualize security data and threat alerts through Wazuh, part of OSSEC Intrusion Detection.
This guide will walk you through the basics of installing and running SELinux.
Tips to improve the security of your SSH server
This guide shows how to set up Fail2Ban, a log-parsing application, to monitor system logs and detect automated attacks on your Linode.
This guide covers basic best practices for securing a production server, including setting up user accounts, configuring a firewall, securing SSH, and disabling unused network services.
This guide outlines steps to protect your data and recover your system in the event of a suspected system compromise.