{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibb7d3ihu7j7plcdm23eknbblkucspc7h2z23bpvc5vsu6xowogx4",
    "uri": "at://did:plc:isx5m6wiqw7ljr7tlrnkukux/app.bsky.feed.post/3mm5dz7kncrn2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihkwylzedxbcurwsgxwb744nzassnsavfs2cdojapt5hvdepzzq34"
    },
    "mimeType": "image/webp",
    "size": 9182
  },
  "path": "/modulejail-the-linux-security-tool-that-blocks-unused-kernel-modules-before-attackers-can-exploit-them/",
  "publishedAt": "2026-05-18T16:45:00.000Z",
  "site": "https://www.tech2geek.net",
  "tags": [
    "Linux",
    "Software",
    "AI vulnerability scanning",
    "Cybersecurity",
    "kernel vulnerabilities",
    "Linux administration",
    "Linux hardening",
    "Linux kernel modules",
    "Linux kernel protection",
    "Linux Security",
    "Linux server hardening",
    "Linux tools",
    "modprobe blacklist",
    "ModuleJail",
    "Open Source Security",
    "privilege escalation",
    "server security"
  ],
  "textContent": "Discover how ModuleJail helps harden Linux servers by blocking unused kernel modules, reducing attack surfaces, and improving system security.",
  "title": "ModuleJail: The Linux Security Tool That Blocks Unused Kernel Modules Before Attackers Can Exploit Them"
}