• /home
  • Books
  • Courses
    • Free Courses
    • Paid Courses
  • Shop
  • Forums
  • Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
  • YouTube
  • LinkedIn
  • GitHub
  • Patreon

All Content

⇨

see all

  • The Log4Shell Vulnerability, and CrowdSec’s Community Response

    TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.

    YouTube player

    Relevant links:

    • CVE information
    • Rapid7 article
    • Tech Republic Article (includes test script)
    • DataDog article
    • Github IP list for this CVE
    • CrowdSec pull request #311
    • CrowdSec YAML code
    • CrowdSec http-cve collection

    ⇨

    Read more: The Log4Shell Vulnerability, and CrowdSec’s Community Response
  • Enterprise Linux Security Episode 13 – Log4Shell

    The Log4Shell vulnerability is making its rounds all over security news sites, and with good reason – it’s quite easy to execute. In this episode, Jay and Joao discuss the vulnerability that exists within log4j, as well as some ways to keep your server safe.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 13 – Log4Shell
  • Enterprise Linux Security Episode 10 – The worst healthcare breaches of 2021

    This year, we’ve had a number of interesting security breaches. In this episode of the Enterprise Linux Security podcast, Joao and Jay talk about the worst healthcare breaches of 2021, and some lessons that can be learned from these events. Specifically, this article is discussed.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 10 – The worst healthcare breaches of 2021
  • Awesome Linux Tools: Lynis from CISOfy

    In this episode of Awesome Linux Tools, the spotlight is on Lynis – a really awesome utility you can use to get a better understanding of the overall security hygiene of your server. In this video, Jay will show you how to install it, and also how to run an audit.

    YouTube player
    (more…)

    ⇨

    Read more: Awesome Linux Tools: Lynis from CISOfy
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
  • Enterprise Linux Security Episode 7 – ELevate

    Remaining on legacy Linux distributions can lead to additional security risks as time goes on, and migrating to a newer and better supported distribution can be a very difficult endeavor for most administrators. In this episode, Jay and Joao are joined by Jack from AlmaLinux, and we talk about ELevate – a tool that can be used to migrate from a distribution in the Enterprise Linux family to another Enterprise Linux distribution. This helps alleviate some of the burden of distro migration, and as a community project it’s also a great project to get started with contributing to an open-source project.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 7 – ELevate
  • Enterprise Linux Security Episode 6 – Image Defaults

    Although there’s no such thing as a “perfect” deployment image, including some sane defaults into your images and templates can save you a lot of work down the road, and also give you the opportunity to include more secure defaults. In this episode, we’ll discuss deployment image defaults as well as some recent news.

    YouTube player
    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 6 – Image Defaults
  • Linux Crash Course – User Account & Password Expiration

    Keeping track of user accounts is very important, especially as a Linux server administrator. In this episode of Linux Essentials, we’ll explore user and password expiration. This will include examples regarding locking passwords, the chage command, and more!

    YouTube player

    Thank you to Linode for sponsoring this video. Check them out here and get your very own Linux server set up in minutes!

    (more…)

    ⇨

    Read more: Linux Crash Course – User Account & Password Expiration
  • Enterprise Linux Security Episode 4 – Supply Chain Attacks

    When you write software, there’s no reason to reinvent the wheel – shared libraries and other resources exist to enable you to create applications while avoiding redundant work. Unfortunately, sometimes the software supply itself chain is attacked, which would mean that your application contain malware or security threats you didn’t account for. In this episode of Enterprise Linux Security, Joao and I discuss supply chain attacks, as well as some ways to mitigate this threat.

    YouTube player
    (more…)

    ⇨

    Read more: Enterprise Linux Security Episode 4 – Supply Chain Attacks
  • Enterprise Linux Security Episode 3 – Linux Distro Migrations

    Migrating your servers from one Linux distribution to another can be a daunting task, even moreso if it’s a migration you’re doing because of unforeseen events or changes within the ecosystem. In this video, Jay and Joao discuss the challenges when it comes to migrating Linux distributions, and the effect this has on security.

    YouTube player

    Ogg version

    MP3 version

    MP3 version (low)

    OS Migration Checklist

    ⇨

    Read more: Enterprise Linux Security Episode 3 – Linux Distro Migrations
Previous Page
1 2 3 4
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.