Software from unknown sources always poses some risks. With the strace analysis tool and the Firejail sandbox, you can monitor and isolate unknown applications to safeguard your system.
Attackers can use poorly maintained DNS records to gain access to your IP address. The open source DNS Reaper lets you monitor your records to ward off attacks.
A new cryptocurrency miner is attacking Linux servers to co-opt them into a cryptocurrency mining network as well as spreading distributed denial-of-service attacks.
To protect your data, you need to do more than schedule regular backups. Here are three often overlooked strategies that can help make your backups more accessible, secure, and reliable.
If you deploy software packages to several computers, the standard Slackware tools lack efficiency. We show you how to create a custom repository to automatically install and upgrade software for multiple systems.