debian hardening

Learn about debian hardening, we have the largest and most updated debian hardening information on alibabacloud.com

Security hardening strategy of Linux system (II.)

First, installation and upgradeUse custom to customize the installation, unnecessary packages as far as possible, if necessary to add password restrictions to the Lilo/grub bootloader, after the installation is completed using Up2date, yum or apt

20 Linux Server Security Hardening Recommendations (i)

Linux server security is important for protecting user data and intellectual property, while also reducing the time you face hackers. At work, the system administrator is usually responsible for the security of Linux, and in this article, 20

Install Oracle 11gR2 on Debian wheezy (RPM)

Install Oracle 11gR2 on Debian wheezySource:http://gaiustech.wordpress.com/2013/06/26/howto-install-oracle-on-debian-wheezy/Oracle 11gR2 on Debian still isn ' t an officially supported configuration (10g XE were for a while), but it's perfectly do-

Ubuntu compile bitcoin source code, solve dependencies

Https://github.com/bitcoin/bitcoin/blob/master/doc/build-unix.md UNIX Build NOTES Some notes on the How to builds Bitcoin Core in Unix. (for OpenBSD specific instructions, BUILD-OPENBSD.MD) Note Always use absolute paths to configure and compile

How to hide a server signature on Apache

This article mainly introduces the method of hiding the server signature on Apache, the example is based on the Linux of Debian department, the friend who need can refer to the Revealing a Web server's signature with server/php version information

How to hide the server signature on Apache _linux

Revealing a Web server's signature with server/php version information can pose a security risk because you are basically telling the attacker about a known vulnerability on your system. Therefore, as a part of the server hardening, it is highly

Linux Ask a question: How to turn off server signing on Apache Web server

issue : Whenever the APACHE2 site server returns an error page (for example, 404 page cannot be found, 403 Forbidden page), it displays the site server signature (for example, Apache version number and operating system information) at the bottom of

"Unix/linux Network log analysis and Traffic monitoring" new book release

This book from the Unix/linux system of raw logs (raw log) collection and analysis, and gradually into the log audit and computer forensics link. The book provides a number of cases, each case with a vivid note of the network after the invasion,

FORTIFY_SOURCE and Linux security protection mechanisms

Today, when compiling a software program, I found the word "FORTIFY_SOURCE", searched it, and found the ora core security mechanism Introduction page. Turn it over. Fedora is the thought and action leader in compliance with the latest Linux security

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.