• /home
  • Books
  • Courses
    • Free Courses
    • Paid Courses
  • Shop
  • Forums
  • Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
  • YouTube
  • LinkedIn
  • GitHub
  • Patreon

All Content

⇨

see all

  • Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s

    The New Year is just beginning, and we already have a few important CVE’s to discuss, this time around Polkit and LUKS. The CVE numbers for these vulnerabilities are CVE-2021-4034 and CVE-2021-4122 respectively. In this episode, Jay and Joao discuss these vulnerabilities.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Relevant links

    • Polkit CVE-2021-4034
    • LUKS CVE-2021-4122

    ⇨

    Read more: Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s
  • Enterprise Linux Security Episode 16 – Library Poisoning

    We’ve discussed supply-chain attacks in the past, and now it’s time to see an actual example that happened recently. However, this particular incident is especially unique as the libraries in question were allegedly poisoned by the actual developer. In this episode, Joao and Jay discuss the recent sabotage regarding two very popular NPM libraries.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 16 – Library Poisoning
  • The Homelab Show – Episode 42: Security Onion

    In the 42nd episode of The Homelab Show (where does the time go?!) Jay and Tom Discuss Security Onion. It’s definitely a very appealing solution for enhancing your security.

    YouTube player

    ⇨

    Read more: The Homelab Show – Episode 42: Security Onion
  • Enterprise Linux Security Episode 15 – High Availability

    It’s frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept that aims to help alleviate (or hopefully eliminate) such downtime, and is a very attractive goal for system administrators. In this episode, Jay and Joao discuss high availability, as well as its pros and cons.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Related articles

    • Log4Shell evolution of evasion patterns
    • Log4Shell Variants and updates

    ⇨

    Read more: Enterprise Linux Security Episode 15 – High Availability
  • Getting Started with OpenSSH Key Management

    In various tutorials throughout the history of LearnLinuxTV, we’ve gone over the importance of using public keys with OpenSSH. But what do you do when you have multiple clients you work with, how do you manage keys between them? In this video, we’ll go through an example scenario where we have three clients, and we need to maintain multiple SSH keys for each.

    YouTube player

    ⇨

    Read more: Getting Started with OpenSSH Key Management
  • Resetting OpenSSH Host Keys (the easy method)

    When creating a deployment image or template for distributing Linux to devices or servers, it’s a good idea to make sure that you reset the host keys for SSH. In this video, I’ll show you an easy method I found for automating this.

    YouTube player

    You can find the systemd unit file I used in the video here.

    (more…)

    ⇨

    Read more: Resetting OpenSSH Host Keys (the easy method)
  • The Log4Shell Vulnerability, and CrowdSec’s Community Response

    TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.

    YouTube player

    Relevant links:

    • CVE information
    • Rapid7 article
    • Tech Republic Article (includes test script)
    • DataDog article
    • Github IP list for this CVE
    • CrowdSec pull request #311
    • CrowdSec YAML code
    • CrowdSec http-cve collection

    ⇨

    Read more: The Log4Shell Vulnerability, and CrowdSec’s Community Response
  • Boosting your Linux Server Security with CrowdSec

    CrowdSec is a cutting-edge security solution for your Linux servers. As an intrusion prevention system, its goal is to stop unauthorized access and prevent attacks. But unlike other IPS solutions, it does it a different way – by using knowledge as power. CrowdSec was covered on this channel before, but in this video, you’ll see an updated look complete with an overview of how to set up protection for WordPress as well.

    YouTube player

    ⇨

    Read more: Boosting your Linux Server Security with CrowdSec
  • Enterprise Linux Security Episode 6 – Image Defaults

    Although there’s no such thing as a “perfect” deployment image, including some sane defaults into your images and templates can save you a lot of work down the road, and also give you the opportunity to include more secure defaults. In this episode, we’ll discuss deployment image defaults as well as some recent news.

    YouTube player
    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 6 – Image Defaults
  • Enterprise Linux Security Episode 05 – The “Attacker” Mindset

    We’ve talked about Enterprise Linux Security from the worldview of the system administrator, but what’s it like on the other side? In this episode, Jay and Joao are joined by Atalay Kelestemur, an Ethical Hacker, as we discuss the mindset of the attacker.

    YouTube player

    ⇨

    Read more: Enterprise Linux Security Episode 05 – The “Attacker” Mindset
Previous Page
1 … 6 7 8 9
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.