<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>SysChk</title>
    <link>https://09fd0192.hugo-syschk-site.pages.dev/</link>
    <description>Recent content on SysChk</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate>Wed, 20 May 2026 19:45:42 +0300</lastBuildDate>
    <atom:link href="https://09fd0192.hugo-syschk-site.pages.dev/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Understanding CIS Benchmarks</title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-20.cis-benchmarks/</link>
      <pubDate>Wed, 20 May 2026 19:45:42 +0300</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-20.cis-benchmarks/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://09fd0192.hugo-syschk-site.pages.dev/images/2026-05-20.CIS-Benchmarks_50.jpg&#34; alt=&#34;CIS-Benchmarks&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;In the world of cybersecurity, there are hundreds of vulnerabilities and potential attack vectors. However, most successful breaches occur not through complex zero-day exploits, but due to common configuration errors: default passwords, enabled legacy protocols, or excessive user permissions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stormy May 2026 in the Linux Kernel</title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-18.may-storm-in-the-linux-kernel/</link>
      <pubDate>Mon, 18 May 2026 08:45:42 +0300</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-18.may-storm-in-the-linux-kernel/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://09fd0192.hugo-syschk-site.pages.dev/images/2026-05-18.May-Storm-in-the-Linux-Kernel_50.jpg&#34; alt=&#34;May-Storm-in-the-Linux-Kernel&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;May 2026 will be remembered as one of the most turbulent periods in recent years.&#xA;Critical vulnerabilities in the Linux kernel are being discovered one after another, linked by an architectural problem in the memory page cache (&lt;strong&gt;Page Cache&lt;/strong&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Antivirus Software in GNU/Linux Server Infrastructure</title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-15.antivirus-gnulinux/</link>
      <pubDate>Fri, 15 May 2026 17:45:42 +0300</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/posts/2026-05-15.antivirus-gnulinux/</guid>
      <description>&lt;p&gt;Linux-based server systems are generally considered more secure against malware compared to other operating systems. However, this does not eliminate the risk entirely. Antivirus software in GNU/Linux server infrastructure is a critical component of a multi-layered security approach, especially in environments where servers interact with client systems or store sensitive data.&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/about/</guid>
      <description>&lt;p&gt;&lt;strong&gt;About Us&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;This website is dedicated to sharing technical information about security, Linux, and related technologies. The author has extensive IT experience since the early 2000s and works as part of a small team. Our goal is to help the community access up-to-date knowledge and practical advice.&lt;/p&gt;&#xA;&lt;p&gt;To make complex technical content more readable and ensure high-quality translations, AI tools are utilized. This allows for more efficient data processing and a better overall experience for the readers.&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/privacy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/privacy/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Privacy Policy&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;We respect your privacy. This website collects minimal personal data necessary for its operation and to improve user experience. We do not share your data with third parties without your consent. Third-party services, such as Google AdSense, may collect anonymous data for advertising purposes. You can manage cookie settings in your browser.&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://09fd0192.hugo-syschk-site.pages.dev/terms/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://09fd0192.hugo-syschk-site.pages.dev/terms/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Terms of Service&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;By using this website, you agree that all information is provided for informational purposes only and does not constitute official advice. We are not responsible for any consequences arising from the use of the materials, including technical guides for system configuration or vulnerability mitigation. You agree not to use the site content for illegal purposes.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
