SELinux can be such a nuisance. In particular, if you have a newly created file system, you will need to add labels to it, also known as SELinux security contexts.
Intel gobbling up Israeli Tower Semiconductor, Stock Goes Through The Roof
Intel (INTC) is getting close to a deal to buy the Israeli-based chip foundry Tower Semiconductor (TSEM). The foundry saw its shares go through the roof late Monday by as much as 50%.
Log4j RCE and mitigation techniques
For quite some time it seemed as if cyber vulnerabilities in the Java ecosystem would be losing ground. Instead, it was the calm before the storm: a vulnerability in the Log4j library threatens web servers and other applications in a variety of ways.
Set up logrotate for Postfix
Finding errors in a postfix log file is tedious work. The job gets even more complicated if you have to dig through old postfix log files which might no longer be relevant. logrotate comes to the rescue, but only if you configure it correctly. Here is how you can do it on Fedora.
Fixing your Web Server’s Security Headers: From Hall of Shame to Hall of Fame
[Updated 2022-11-30] This post explains how to set up robust security headers in NGINX to protect your web application from malicious payloads and other forms of attacks. Choose your HTTP(S) headers wisely.
- Next Page »