Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
This sample chapter from Real World Linux Security: Intrusion Prevention, Detection and Recovery teaches you how to regain control of your system if it is cracked, and how to prevent future security breaches.
As 2015 winds down to a close, I reflect on what 2015 brought IT.
New Mac OS X Means New Tricks...
Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?
I have several types of mobile devices, both low-cost Android tablets and iPads and smartphones of all types and vendors. Maybe you've discovered problems similar to these I list?