Human genes adapted to life in the Arctic

By using genetic information from 4500 Greenlanders, researchers investigated which genes have changed the most over the roughly 20,000 years since the Greenlanders’ most ancient anc...


Using SSH keys instead of passwords

Using SSH keys instead of passwords Linux systems are usually managed remotely with SSH (secure shell). [root@arch ~]# ssh-keygen -l -f .ssh/id_rsa 4096 98:eb:9a:f7:94:bf:a0:a1:4b:5...


Security Program: Implementing Linux Security

With a proper security program, implementing Linux security can be greatly simplified. Change Management Almost everything is changing continuously. Besides tooling, there is people...


Securing mount points on Linux

By default the mount options are not focused on security, which gives us a room to further improve hardening of the system. Via mount options we can apply additional security control...


Monitoring Linux Systems for Rootkits

System Protection Kernel The kernel is the brain of the software system and decides what should be executed by the central processing unit. Intrusion Detection While prevention is...


Linux Security for DevOps

We are especially interested in Linux security for DevOps and what they can apply. From the previously mentioned CMDB, used software components, documentation tools or developer repo...


Intrusion detection: Linux rootkits

What is a rootkit? Rootkit detection Methods to detect rootkit presence Since rootkits are malicious, they should be detected as soon as possible. Rootkit detection tools File int...


Suckless

This project focuses on advanced and experienced computer users, in contrast with the usual proprietary software world or many mainstream open source projects that focus more on aver...


If our eyes could see gravitational waves

This is what the merger of two black holes would look like. It is a computer simulation of the gravitational waves that would ripple away from the titanic collision, a bit like the r...