best linux security software

Discover best linux security software, include the articles, news, trends, analysis and practical advice about best linux security software on alibabacloud.com

Linux Software Installation _unix Linux

1. What are the Chinese systems under Linux? Mainly have cxterm, Wzce, Cxwin, Xcin, Zhxwin. Cxterm is a Chinese terminal running under the X-window. Wzce is a terminal that runs as a shell. Cxwin is a xserver that supports Chinese. Xcin can enter Chinese under X-window. Zhxwin is a Chinese input program that requires cxterm. Download the above software, for example, to download cxterm into the Free

Making Linux safer -- Thinking about security

Article Title: making Linux safer-thinking about security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.    Security Definition

Red Hat Linux Security Settings

important sites use ProFTPD. Sourceforge.net is a good example (this site has a total of 3,000 open-source projects, and its load is not small !). Some Linux Publishers also use ProFTPD on their main FTP site, and WuFTPD is only used by two major Linux Publishers (SuSE and Caldera. Another advantage of ProFTPD is that it can run both from inetd and as a separate daemon. This can easily solve some problems

It Essentials Linux security Koriyuki SSH usage, security, identity authentication and configuration ... "Go"

private keysSsh-keygen-t RSA (This is the case with test)Enter------------password------Confirm passwordThe first file is a private keyThe second file is a public keyUpload test's private key to Test1.Ssh-copy-idEnter the test1 passwordSuccessfully uploadedSwitch to Test1Cd. SSHLlThe private key of test was foundAt this time we use test to go to the user login test1, need to enter a password, not test1 passwordTurn fromIt Essentials Linux

Linux Security---selinux security control

: Compared to move and copy, replication is more conducive to maintaining SELinux properties, recommended use.4.tar packaged backup with SELinux; special SELinux type:file_t,default_t,user_tmp_tThe default selinux is lost when Tar is packaged, and the SELinux property can be maintained using "--selinux|--xattrs".tar-zcvf/tmp/test-sel.tar.gz/var/www/html/--selinuxSpecial type:file_t: File does not have SELinux attributedefault_t: The SELinux of the file or directory does not match the File-contex

10 tricks to ensure Linux security _unix Linux

Linux has many advantages in function, price or performance, however, as an open operating system, it inevitably has some security problems. about how to solve these hidden dangers, to provide a safe operation platform for the application, this article will tell you some of the most basic, most commonly used, but also the most effective tricks. Linux is a UNIX-li

Web services middleware software and server and client software in Linux

management cost.Support autonomous reconfiguration of complex application systems in the face of new application goals and changing environmentsSupport Self-diagnosis and recovery of complex application SystemsSupport autonomous optimization of complex application SystemsSupport for autonomous protection of complex application systemsHigh AvailabilityProvide secure, trusted information servicesSupports large-scale concurrent client accessProvides more than 99.99% system availabilityProvide secu

Introduction to Linux security mechanisms for Linux gamers (1)

question. This is what I should pay attention to when installing and selecting the release.1. Version SelectionI have been using redhat for a long time. I personally think that redhat. version 0 is the first version of the major version upgrade. Many software packages in this version are not stable and are prone to faults. for administrators, most of linux is used as servers, to be the most server, the mos

Top 10 Enterprise Linux Server Security Protection points

protection. Using them comprehensively can complement each other and give full play to their respective advantages to achieve comprehensive defense. 9. Evaluation: vulnerability tracking and management As an excellent open-source software, Linux has developed rapidly. At the same time, its existing problems will be gradually exposed in future applications. Hackers pay more attention to new technologies t

Linux system security and application--pam security certification

following four kinds:(1) required validation fails, but returns fail(2) Requisite verification failure immediately ends the entire verification process and returns fail(3) Sufficient verification succeeds immediately returns, no longer continues, otherwise ignores the result and continues(4) optional is not used for verification, just display information (usually used for session type)Third, Pam verification process  The following is an explanation of the validation sample tableTo Use1 example,

Linux install software memo Linux u disk install Linux get started Linux install JDK

Downloadwget http://.....tar.gzExtractTAR-ZXVF xxx.tar.gzcd XXX./configure--prefix=/usr/local/xxx--with-x=/usr/local/xCompileMakeInstallationMake installNginx Start/usr/local/nginx/sbin/nginx Stop/usr/local/nginx/sbin/nginx-s Stop Focus/usr/local/nginx/sbin/nginx-s Reload httpd start, shut down, restart/usr/local/http/bin/apachectl-k [Start | stop ...]Find processPs-ef|grep xxx The above describes the Linux installation

[Linux software tutorial] image editing software GIMP Single Window Mode settings

[Linux software tutorial] image editing software GIMP Single Window Mode settings GIMP is known as the PS software of Linux. Although GIMP is not as powerful as PS, it is already the best picture editing software in

Linux Network security Incomplete notes

attacksVSFTPD small and safe, very famous sites are in use.Ftp.redhat.com ftp.suse.comftp.debian.org ftp.openbsd.org Ftp.freebsdFTP-specific attacks1.DDOS attack2. Remote Overflow Vulnerability3. Local rights loopholes4. Brute Force attack5. Be sniffer to plaintext password DsniffEttercap-ng16, the Linux server security VPN17, Linux server

Linux security configuration steps

can run both from inetd and as a separate daemon. In this way, some problems caused by inetd can be easily solved, such as denial of service (DoS) attacks. The simpler the system, the easier it is to ensure system security. WuFTPD either review all source code (very difficult) or completely rewrite the code. Otherwise, WuFTPD must be replaced by ProFTPD. Telnet Telnet is very insecure. It uses plain text to send passwords. Its safe alternative is Op

Linux workstation security check list

Linux workstation security check list Target readers This document is intended for users who use Linux workstations to access and manage system administrators in the project infrastructure team. If your team's system administrator is a remote engineer, you can use this document to help them ensure that their workstation meets the most basic

Essentials of Enterprise Linux Server security protection

network traffic simply by comparing IP address/port pairs, and IDs is more specific, and it needs to go through specific packets (some or all) To filter network traffic, is the second layer of security protection. Comprehensive use of them, can be complementary, and play their own advantages, and ultimately achieve comprehensive defense. 9, Evaluation: Vulnerability tracking and management Linux as a goo

Yang Zeyi: Linux Remote Desktop Connection software Xshell and FTP software xftp installation Graphics tutorial

Tags: highlight ftp font ack color Normal window desktop tleIn the Linux system, Xshell and xftp are used together, is a very convenient set of Linux server Management software.Xshell is to operate the server by entering commands such as entering directories, compressing files, extracting files, starting services, and so on.Xftp is a visual tool, functions and FLASHFXP almost, can upload, download, move fil

"Linux Security" Security Password policy setting

Command:Vim/etc/login.defsDefault settings:# Password Aging controls:## Pass_max_days Maximum Number of days a password is used.# pass_min_days Minimum number of days allowed bet Ween password changes.# pass_min_len Minimum acceptable password length.# pass_warn_age number of Days warning given before a password expires. #PASS_MAX_DAYS 99999pass_min_days 0 Pass_min_len 5 pass_warn_age 7Analytical:Pass_max_days---Password valid days, maximum how long to change

Summary of software installation methods in Linux (centos)

This article is excerpted from: laruence Linux Private food basic article 22nd, chapter 23; reprinted please note the Source: http://www.cnblogs.com/beanmoon/archive/2012/10/30/2746103.html Installing and uninstalling software in Linux is a headache and does not need to be as convenient as in windows. In general, there are the following types:1. tarball The so-ca

Linux companies are increasingly focusing on product security because of the "favor" that hackers have repeatedly received from Linux operating platforms.

Guardian Digital and security Management Service provider (MSSP) Guardent launches new products that will improve the security performance of open source and Linux products.Guardian Digital will launch a new product at the LinuxWorld Fair in New York at the end of this month as a complement to its web-EnGarde secure Linux

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.