Ways to Manage Your SSH Keys and Identities

I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
Read More ›

How Does Linux Boot? Part 4: Rescuing a System with the Grand Unified Boot Loader

Last week our detailed tour of the Linux boot sequence (which started here) got as far as the “shim” component handling Secure Boot in the UEFI environment and then calling the next program in the chain, probably grubx64.efi. We found that grubx64.efi is part of the grub2-efi package and it references the file grub.cfg, also […]
Read More ›

The New Android Version Should Help Security

Google released Android version 4.4 (a.k.a. KitKat) at the end of October. The many changes include some nice security improvements. In Learning Tree’s Cloud Security Essentials course we talk about the need for mobile device security. With Saas (or Software as a Service) offerings, you have no control over what happens with your data on […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.