Discover best linux security software, include the articles, news, trends, analysis and practical advice about best linux security software on alibabacloud.com
1. What are the Chinese systems under Linux?
Mainly have cxterm, Wzce, Cxwin, Xcin, Zhxwin. Cxterm is a Chinese terminal running under the X-window. Wzce is a terminal that runs as a shell. Cxwin is a xserver that supports Chinese. Xcin can enter Chinese under X-window. Zhxwin is a Chinese input program that requires cxterm.
Download the above software, for example, to download cxterm into the Free
Article Title: making Linux safer-thinking about security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Security Definition
important sites use ProFTPD. Sourceforge.net is a good example (this site has a total of 3,000 open-source projects, and its load is not small !). Some Linux Publishers also use ProFTPD on their main FTP site, and WuFTPD is only used by two major Linux Publishers (SuSE and Caldera.
Another advantage of ProFTPD is that it can run both from inetd and as a separate daemon. This can easily solve some problems
private keysSsh-keygen-t RSA (This is the case with test)Enter------------password------Confirm passwordThe first file is a private keyThe second file is a public keyUpload test's private key to Test1.Ssh-copy-idEnter the test1 passwordSuccessfully uploadedSwitch to Test1Cd. SSHLlThe private key of test was foundAt this time we use test to go to the user login test1, need to enter a password, not test1 passwordTurn fromIt Essentials Linux
: Compared to move and copy, replication is more conducive to maintaining SELinux properties, recommended use.4.tar packaged backup with SELinux; special SELinux type:file_t,default_t,user_tmp_tThe default selinux is lost when Tar is packaged, and the SELinux property can be maintained using "--selinux|--xattrs".tar-zcvf/tmp/test-sel.tar.gz/var/www/html/--selinuxSpecial type:file_t: File does not have SELinux attributedefault_t: The SELinux of the file or directory does not match the File-contex
Linux has many advantages in function, price or performance, however, as an open operating system, it inevitably has some security problems. about how to solve these hidden dangers, to provide a safe operation platform for the application, this article will tell you some of the most basic, most commonly used, but also the most effective tricks.
Linux is a UNIX-li
management cost.Support autonomous reconfiguration of complex application systems in the face of new application goals and changing environmentsSupport Self-diagnosis and recovery of complex application SystemsSupport autonomous optimization of complex application SystemsSupport for autonomous protection of complex application systemsHigh AvailabilityProvide secure, trusted information servicesSupports large-scale concurrent client accessProvides more than 99.99% system availabilityProvide secu
question. This is what I should pay attention to when installing and selecting the release.1. Version SelectionI have been using redhat for a long time. I personally think that redhat. version 0 is the first version of the major version upgrade. Many software packages in this version are not stable and are prone to faults. for administrators, most of linux is used as servers, to be the most server, the mos
protection. Using them comprehensively can complement each other and give full play to their respective advantages to achieve comprehensive defense.
9. Evaluation: vulnerability tracking and management
As an excellent open-source software, Linux has developed rapidly. At the same time, its existing problems will be gradually exposed in future applications. Hackers pay more attention to new technologies t
following four kinds:(1) required validation fails, but returns fail(2) Requisite verification failure immediately ends the entire verification process and returns fail(3) Sufficient verification succeeds immediately returns, no longer continues, otherwise ignores the result and continues(4) optional is not used for verification, just display information (usually used for session type)Third, Pam verification process The following is an explanation of the validation sample tableTo Use1 example,
[Linux software tutorial] image editing software GIMP Single Window Mode settings
GIMP is known as the PS software of Linux. Although GIMP is not as powerful as PS, it is already the best picture editing software in
attacksVSFTPD small and safe, very famous sites are in use.Ftp.redhat.com ftp.suse.comftp.debian.org ftp.openbsd.org Ftp.freebsdFTP-specific attacks1.DDOS attack2. Remote Overflow Vulnerability3. Local rights loopholes4. Brute Force attack5. Be sniffer to plaintext password DsniffEttercap-ng16, the Linux server security VPN17, Linux server
can run both from inetd and as a separate daemon. In this way, some problems caused by inetd can be easily solved, such as denial of service (DoS) attacks. The simpler the system, the easier it is to ensure system security. WuFTPD either review all source code (very difficult) or completely rewrite the code. Otherwise, WuFTPD must be replaced by ProFTPD.
Telnet
Telnet is very insecure. It uses plain text to send passwords. Its safe alternative is Op
Linux workstation security check list
Target readers
This document is intended for users who use Linux workstations to access and manage system administrators in the project infrastructure team.
If your team's system administrator is a remote engineer, you can use this document to help them ensure that their workstation meets the most basic
network traffic simply by comparing IP address/port pairs, and IDs is more specific, and it needs to go through specific packets (some or all) To filter network traffic, is the second layer of security protection. Comprehensive use of them, can be complementary, and play their own advantages, and ultimately achieve comprehensive defense.
9, Evaluation: Vulnerability tracking and management
Linux as a goo
Tags: highlight ftp font ack color Normal window desktop tleIn the Linux system, Xshell and xftp are used together, is a very convenient set of Linux server Management software.Xshell is to operate the server by entering commands such as entering directories, compressing files, extracting files, starting services, and so on.Xftp is a visual tool, functions and FLASHFXP almost, can upload, download, move fil
Command:Vim/etc/login.defsDefault settings:# Password Aging controls:## Pass_max_days Maximum Number of days a password is used.# pass_min_days Minimum number of days allowed bet Ween password changes.# pass_min_len Minimum acceptable password length.# pass_warn_age number of Days warning given before a password expires. #PASS_MAX_DAYS 99999pass_min_days 0 Pass_min_len 5 pass_warn_age 7Analytical:Pass_max_days---Password valid days, maximum how long to change
This article is excerpted from: laruence Linux Private food basic article 22nd, chapter 23; reprinted please note the Source: http://www.cnblogs.com/beanmoon/archive/2012/10/30/2746103.html
Installing and uninstalling software in Linux is a headache and does not need to be as convenient as in windows. In general, there are the following types:1. tarball
The so-ca
Guardian Digital and security Management Service provider (MSSP) Guardent launches new products that will improve the security performance of open source and Linux products.Guardian Digital will launch a new product at the LinuxWorld Fair in New York at the end of this month as a complement to its web-EnGarde secure Linux
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.