Linux is one of the most secure operating systems out there, but that doesn’t mean it’s free from attacks or vulnerabilities. Experts recommend always taking extreme precautions. Therefore, we leave you some tips to properly shield Linux servers in our post today.
One more year, the popular Free Software University Contest has been called. Registrations for the XV edition of this contest will close on Sunday, March 21. University, high school, middle grade, higher grade, and third cycle or master students still have time to present their projects.
UDS Enterprise will star in the next TECNIRIS video session organized by RedIRIS next Tuesday, March 16. The event will focus on Experiences with Raspberry Pi in the ICT services of the academic-scientific community.
One of our clients suggested this topic, the Badajoz Provincial Council, who will share details about its project to deploy a remote working platform with Raspberries Pi and UDS Enterprise.
One of our clients, the University of Modena and Reggio Emilia (UNIMORE) has translated UDS Enterprise into Italian. After learning about the software and starting to carry out the required tests to see if it was the most appropriate VDI solution to resolve their problems, the IT team of this educational center raised the possibility of improving the translation into the native language of their students.
Google and The Linux Foundation have reached an agreement to improve Linux security. The search engine will allocate funds to finance the work of two kernel developers to focus on tasks aimed at shielding the system.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.