YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 36 – First Live Episode!

    In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 36 – First Live Episode!
  • Enterprise Linux Security Episode 31 – How NOT to Research Security

    A “researcher” with a screen name of “Sockpuppets” decides to demonstrate how insecure some specific online resources are, in the worst way possible. You can’t make this stuff up! In this episode, Jay and Joao discuss what this individual wanted to accomplish (and what happened instead).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • How I hacked CTX and PHPass Modules

    ⇨

    Read more: Enterprise Linux Security Episode 31 – How NOT to Research Security
  • Enterprise Linux Security Episode 30 – Tools & Utilities

    There are many tools and utilities around security and network management, and in this episode of Enterprise Linux Security, Jay and Joao discuss some of their favorites.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 30 – Tools & Utilities
  • Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management

    We talk a lot about patching on this podcast, and the reason for that is because a lot of organizations don’t seem to handle this important aspect of security very well. A recent patching report from the Ponemon institute seems to reflect this, and the stats regarding patching definitely don’t look good. In this episode of Enterprise Linux Security, Jay and Joao discuss some of the findings within this report.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Related Links

    • The state of enterprise Linux security management (report)

    ⇨

    Read more: Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management
  • YubiKey Complete Getting Started Guide!

    Have you considered using a YubiKey? In this complete guide, you’ll learn everything you need in order to get started with these awesome security keys. We’ll go over the differences between the available models, which one you should buy, as well as how to set it up to protect local logon for Linux, macOS, and Windows. In addition, two methods for protecting OpenSSH via YubiKeys are also covered.

    YouTube player
    (more…)

    ⇨

    Read more: YubiKey Complete Getting Started Guide!
  • Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s

    The New Year is just beginning, and we already have a few important CVE’s to discuss, this time around Polkit and LUKS. The CVE numbers for these vulnerabilities are CVE-2021-4034 and CVE-2021-4122 respectively. In this episode, Jay and Joao discuss these vulnerabilities.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Relevant links

    • Polkit CVE-2021-4034
    • LUKS CVE-2021-4122

    ⇨

    Read more: Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s
  • Resetting OpenSSH Host Keys (the easy method)

    When creating a deployment image or template for distributing Linux to devices or servers, it’s a good idea to make sure that you reset the host keys for SSH. In this video, I’ll show you an easy method I found for automating this.

    YouTube player

    You can find the systemd unit file I used in the video here.

    (more…)

    ⇨

    Read more: Resetting OpenSSH Host Keys (the easy method)
  • The Log4Shell Vulnerability, and CrowdSec’s Community Response

    TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.

    YouTube player

    Relevant links:

    • CVE information
    • Rapid7 article
    • Tech Republic Article (includes test script)
    • DataDog article
    • Github IP list for this CVE
    • CrowdSec pull request #311
    • CrowdSec YAML code
    • CrowdSec http-cve collection

    ⇨

    Read more: The Log4Shell Vulnerability, and CrowdSec’s Community Response
  • Enterprise Linux Security Episode 13 – Log4Shell

    The Log4Shell vulnerability is making its rounds all over security news sites, and with good reason – it’s quite easy to execute. In this episode, Jay and Joao discuss the vulnerability that exists within log4j, as well as some ways to keep your server safe.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 13 – Log4Shell
  • Enterprise Linux Security Episode 10 – The worst healthcare breaches of 2021

    This year, we’ve had a number of interesting security breaches. In this episode of the Enterprise Linux Security podcast, Joao and Jay talk about the worst healthcare breaches of 2021, and some lessons that can be learned from these events. Specifically, this article is discussed.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 10 – The worst healthcare breaches of 2021
  • Awesome Linux Tools: Lynis from CISOfy

    In this episode of Awesome Linux Tools, the spotlight is on Lynis – a really awesome utility you can use to get a better understanding of the overall security hygiene of your server. In this video, Jay will show you how to install it, and also how to run an audit.

    YouTube player
    (more…)

    ⇨

    Read more: Awesome Linux Tools: Lynis from CISOfy
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
Previous Page
1 2 3
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.