<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: 22 Open-Source Linux Server Security Tools in 2024	</title>
	<atom:link href="https://www.geeksmint.com/linux-security-tools/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.geeksmint.com/linux-security-tools/</link>
	<description>GeeksMint: Computers, How-to&#039;s, Internet, Tips and Tricks</description>
	<lastBuildDate>Thu, 04 Jan 2024 07:12:45 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Ravi Saive		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-38655</link>

		<dc:creator><![CDATA[Ravi Saive]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 09:09:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-38655</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.geeksmint.com/linux-security-tools/#comment-38548&quot;&gt;Dimitri&lt;/a&gt;.

@Dimitri,

Thank you for your suggestion. &lt;strong&gt;OpenSCAP&lt;/strong&gt; has been added to the article. Your input is greatly appreciated.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.geeksmint.com/linux-security-tools/#comment-38548">Dimitri</a>.</p>
<p>@Dimitri,</p>
<p>Thank you for your suggestion. <strong>OpenSCAP</strong> has been added to the article. Your input is greatly appreciated.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Dimitri		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-38548</link>

		<dc:creator><![CDATA[Dimitri]]></dc:creator>
		<pubDate>Sat, 04 Nov 2023 11:22:04 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-38548</guid>

					<description><![CDATA[I would submit that OpenSCAP should be included in the list.]]></description>
			<content:encoded><![CDATA[<p>I would submit that OpenSCAP should be included in the list.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Muhammad		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-29663</link>

		<dc:creator><![CDATA[Muhammad]]></dc:creator>
		<pubDate>Mon, 12 Jun 2023 03:40:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-29663</guid>

					<description><![CDATA[Great list but you missed one of the best ones I think! Can you please add &lt;strong&gt;CrowdSec&lt;/strong&gt;?

Open source, crowdsourced protection against malicious IPs.]]></description>
			<content:encoded><![CDATA[<p>Great list but you missed one of the best ones I think! Can you please add <strong>CrowdSec</strong>?</p>
<p>Open source, crowdsourced protection against malicious IPs.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Michael Boelen		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-5356</link>

		<dc:creator><![CDATA[Michael Boelen]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 12:56:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-5356</guid>

					<description><![CDATA[Why is number 15 (mtr) listed? Does not sound like a security tool.

I created a tool (started in 2007, still maintained) that might help readers. It is &lt;a href=&quot;https://github.com/CISOfy/lynis&quot; rel=&quot;nofollow ugc&quot;&gt;Lynis&lt;/a&gt;, a security scanner for Linux and Unix systems. Open source and free to use.]]></description>
			<content:encoded><![CDATA[<p>Why is number 15 (mtr) listed? Does not sound like a security tool.</p>
<p>I created a tool (started in 2007, still maintained) that might help readers. It is <a target="_blank" href="https://github.com/CISOfy/lynis" rel="nofollow ugc">Lynis</a>, a security scanner for Linux and Unix systems. Open source and free to use.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: michael biller		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-3123</link>

		<dc:creator><![CDATA[michael biller]]></dc:creator>
		<pubDate>Mon, 19 Nov 2018 03:31:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-3123</guid>

					<description><![CDATA[Another great article. Your list was spot on, as usual. Having once been a MCSE I tend to keep up with anything related to computer security. Linux, Windows, MacOS, and especially Android. It&#039;s pretty much wired into my subconscious and I always take it seriously.

You did manage to bring a couple of tools to my attention I was not familiar with like Nitco. One thing I have learned through the years is that an ounce of prevention goes a long way. Being aware of the potential threats is the first step in mitigating them. I use many of the tools mentioned, regularly. Usually, the biggest problem I have to deal with is WiFi intrusions. Had to deal with is more accurate because it&#039;s zipped up like Fort Knox now.

Computer security is not something everyone puts a premium on. That always amazes me, too. Just about everyone uses WiFi but does not secure it well. Kali and a laptop, tells me so. The sheer amount of WEP tells me that the owner probably never updates anything or using outdated equipment. Even if that is the case WPA/WPA2 is available, I would think.

Many people are just not security conscious, or savvy. Or, they don&#039;t care. I ran into that all the time when I worked in IT trying to keep Windows workstations secure and working. It was a job. A very stressful job.

I must admit though, that when it came to Windows, the user posed the main problem. Windows has issues, to be sure but the reality is they can be minimized and mostly eliminated with a little effort and know-how. Unfortunately, there is little that can be done when the user practices bad computing habits, such as opening attachments, installing software from shady sources, or dangerous web surfing.

Much of that was prevented in company owned systems thru restriction protocols and other methods. Even with restrictions in place some systems would become infected because of a user visiting a shady site(often porn) that hadn&#039;t made it on the restricted list. 

My point, is that the user is either the first line of defense, or the problem. Mostly, it&#039;s the latter. A large part of Windows users practice bad computing habits and believe the fault is the system. Home computers rarely have adequate security implements and are basically ticking time bombs.

Ironically, Linux is the system that type of computer user would be better off using. Those users who are security conscious rarely have many problems, even using Windows. Linux users seem to all be security conscious, by default, and most Windows users that decide to make the switch are cut from the same cloth.


The type of Windows user I was referring to earlier has no interest in security and will not change their habits. They could care less about Linux and will believe something went wrong with Windows when malware takes their system out. The majority will go out and buy a new computer and start the process all over never understanding, or caring, why these things happened. 

Those types were a thorn in our side more than Windows ever was. For those of us in IT, it was a running battle and we were always to blame when their system broke. Whenever, we would attempt to educate them they wouldn&#039;t listen and always claimed they did not do anything to cause the problem. They were obviously unaware that everything was logged. Needless to say, I do not miss any of that.


To get back to your article, have you ever tried setting up your own VPN? If so, I would be interested to know the outcome. I have been boning up on the subject and it has me interested. For one, it&#039;s free which is always a bonus (not that I mind paying, especially for peace of mind). Mainly, it&#039;s something I have never attempted and it sounds like it could be a good learning experience. I will let you know my findings and if it was a worthwhile endeavor.


I use NordVPN and have no complaints but my curiosity often dictates my direction.]]></description>
			<content:encoded><![CDATA[<p>Another great article. Your list was spot on, as usual. Having once been a MCSE I tend to keep up with anything related to computer security. Linux, Windows, MacOS, and especially Android. It&#8217;s pretty much wired into my subconscious and I always take it seriously.</p>
<p>You did manage to bring a couple of tools to my attention I was not familiar with like Nitco. One thing I have learned through the years is that an ounce of prevention goes a long way. Being aware of the potential threats is the first step in mitigating them. I use many of the tools mentioned, regularly. Usually, the biggest problem I have to deal with is WiFi intrusions. Had to deal with is more accurate because it&#8217;s zipped up like Fort Knox now.</p>
<p>Computer security is not something everyone puts a premium on. That always amazes me, too. Just about everyone uses WiFi but does not secure it well. Kali and a laptop, tells me so. The sheer amount of WEP tells me that the owner probably never updates anything or using outdated equipment. Even if that is the case WPA/WPA2 is available, I would think.</p>
<p>Many people are just not security conscious, or savvy. Or, they don&#8217;t care. I ran into that all the time when I worked in IT trying to keep Windows workstations secure and working. It was a job. A very stressful job.</p>
<p>I must admit though, that when it came to Windows, the user posed the main problem. Windows has issues, to be sure but the reality is they can be minimized and mostly eliminated with a little effort and know-how. Unfortunately, there is little that can be done when the user practices bad computing habits, such as opening attachments, installing software from shady sources, or dangerous web surfing.</p>
<p>Much of that was prevented in company owned systems thru restriction protocols and other methods. Even with restrictions in place some systems would become infected because of a user visiting a shady site(often porn) that hadn&#8217;t made it on the restricted list. </p>
<p>My point, is that the user is either the first line of defense, or the problem. Mostly, it&#8217;s the latter. A large part of Windows users practice bad computing habits and believe the fault is the system. Home computers rarely have adequate security implements and are basically ticking time bombs.</p>
<p>Ironically, Linux is the system that type of computer user would be better off using. Those users who are security conscious rarely have many problems, even using Windows. Linux users seem to all be security conscious, by default, and most Windows users that decide to make the switch are cut from the same cloth.</p>
<p>The type of Windows user I was referring to earlier has no interest in security and will not change their habits. They could care less about Linux and will believe something went wrong with Windows when malware takes their system out. The majority will go out and buy a new computer and start the process all over never understanding, or caring, why these things happened. </p>
<p>Those types were a thorn in our side more than Windows ever was. For those of us in IT, it was a running battle and we were always to blame when their system broke. Whenever, we would attempt to educate them they wouldn&#8217;t listen and always claimed they did not do anything to cause the problem. They were obviously unaware that everything was logged. Needless to say, I do not miss any of that.</p>
<p>To get back to your article, have you ever tried setting up your own VPN? If so, I would be interested to know the outcome. I have been boning up on the subject and it has me interested. For one, it&#8217;s free which is always a bonus (not that I mind paying, especially for peace of mind). Mainly, it&#8217;s something I have never attempted and it sounds like it could be a good learning experience. I will let you know my findings and if it was a worthwhile endeavor.</p>
<p>I use NordVPN and have no complaints but my curiosity often dictates my direction.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Divine		</title>
		<link>https://www.geeksmint.com/linux-security-tools/#comment-3170</link>

		<dc:creator><![CDATA[Divine]]></dc:creator>
		<pubDate>Thu, 08 Nov 2018 10:03:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.geeksmint.com/?p=17936#comment-3170</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.geeksmint.com/linux-security-tools/#comment-3136&quot;&gt;Andrey&lt;/a&gt;.

Thank you.

Yes, NordVPN is awesome although it is neither free nor open-source. I mentioned it in a different security and privacy-related post.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.geeksmint.com/linux-security-tools/#comment-3136">Andrey</a>.</p>
<p>Thank you.</p>
<p>Yes, NordVPN is awesome although it is neither free nor open-source. I mentioned it in a different security and privacy-related post.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
