Discover best linux security software, include the articles, news, trends, analysis and practical advice about best linux security software on alibabacloud.com
PackageDemonstrate: Rpm-q Samba//whether the query program is installedrpm-ivh/media/cdrom/redhat/rpms/samba-3.0.Ten-1.4e.i386.rpm//install and show progress by PathRPM-IVH--relocate/=/opt/gaim gaim-1.3.0-1. fc4.i386.rpm//specifying the installation directoryrpm-IVH--test gaim-1.3.0-1. fc4.i386.rpm//used to check dependencies; not a real installation;RPM-UVH--oldpackage gaim-1.3.0-1. fc4.i386.rpm//new version downgraded to old versionrpm-qa | grep httpd #[Search Specifies whether RPM package
. Linux publishers in the U.S. will have to think of something else (for example: Red hat has the latest openssh RPM packages on the German FTP server (ftp.redhat.de)).
Telnet is an incurable procedure. To ensure the security of the system, you must replace it with software such as OpenSSH.
Sendmail
In recent years, the se
One
way to install the RPM software in bare Linux (no gcc, no RPM Package Manager, no make command, no system software manager such as Apt-get,zypper,yast, etc.) Installing software in an extremely cropped Linux system is a hassle.
Our bare
, the most famous is NSA's SELinux.
But how can we raise the future of linux security? I have written a lot about the current situation and the past of linux security, but I have not written about the future. This month, I will summarize what I think of as linux
The following is explained by installing and uninstalling Ryu:1, Ryu installation1.1, the normal mode of installation steps(1) First way: Simple installation method Apt-get:sudo Apt-get install Ryu (2) The second way: Source installation: First, there are configure files, first run the command:./configure then, there are makefile files, Run command: Make all finally, run the command: make install1.2. Install Python's source code or software(1) The fir
this way, backdoors can be minimized to reduce risks, and system resources can be reasonably allocated to improve the performance of the entire machine. The following are some uncommon services:
1. the fingerd (finger server) reports the personal information of a specified user, including the user name, real name, shell, directory, and contact information. It will expose the system to undesirable intelligence collection activities, do not start this service.
2. the R Service (rshd, rlogin, rwho
There are times in development when you need to see if a software is installed, and to configure the configuration file for a particular software, you need to know where it is installed. But Linux installs the software the way to be more, the useful Yum source installs, has installs the RPM package, also has the tar to
.
2. delete unused software packages
During system planning, the general principle is to remove all unnecessary services. By default, Linux is a powerful system that runs many services. However, many services are not required and may cause security risks. This file is/etc/inetd. conf, which defines the services to be listened to by/usr/sbin/inetd. You may o
major Linux Publishers (SuSE and Caldera.
Another advantage of ProFTPD is that it can run both from inetd and as a separate daemon. In this way, some problems caused by inetd can be easily solved, such as denial-of-service (DoS) attacks. The simpler the system, the easier it is to ensure system security. WuFTPD either review all source code (very difficult) or completely rewrite the code. otherwise, WuFTPD
Tags: Upgrade show Lin requires Linux image src command to deleteInstalling software in the Linux terminalThere are three kinds of ways: Rpm,yum, source installation. This essay only shows how RPM installs the softwareRPM Install the command to see if the software is installed1. Install the PackageInstall package use c
++++++++++++++++++++++++++++++++++++++++++Rpm-qa|grep Package++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++RPM-QL Software Name ++++++++++++++++++++++++++++++++++++++++++See how it is installed. There are two ways to install the source code and package. The source code installation can see configure's log, RPM and other packages, it is necessary to check the database, such as rpm-q for query. -Q +++++++++++++
First, Introduction
When we install the software on the Windows system, we add some information related to these programs, and set him up as a database, we can implement software installation, uninstall, upgrade and verification, similar to the "Add Remove Program" of Windows. Because the source package is used to set up compilation parameters on Linux systems,
. You may need another machine to obtain important tools and security patches from the Internet, and then transfer them to a separate "configuration Network.
When you place the machines to be used as firewalls in an isolated network, you can start the next step.
The first step is to select the software package to be installed on the operating system. For red hat 6.0, three installation options are available
, and press "Next" to continue. In this way, format the partition and activate the partition. Linux can use this partition.
Next, if you choose to install LILO, you will see the configuration of LILO. You can choose to install LILO in the primary Boot Sector (MBR) or the first sector of the boot partition.
In general, you should choose to install LILO in the primary Boot Sector. (If your computer is installed with NT, or multiple boot programs s
As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, whic
Linux software package dependency makes many users in Linux very troublesome. During Linux installation, not all software packages are installed. After installing the software, you may encounter some dependency problems. For examp
For example, if you teach a person who can't drive a car, just call him behind the wheel and say, "Open it!" ...... Well? Just fire first! What, you're not going to fire? Screw this key! What then what to do! Hang up the gear, just play the push! And then stepping on the accelerator is over! Alas, please put your hands on the brakes first, OK? This one, put it down! Just grab the wheel! Turn over!!! Look at the front watch I'm going to hit AH ah ah Ah!!!Are you all right? If a
the tar-c-f archive file. You Need To uncompress the file tar-x-C and uncompress it to the specified directory-f archive file.
12. man command, the Manual of each command, such as man dir; exit by q.
13. Linux pipeline command: A software or command usually needs to input raw data to complete one task. After processing, output the processing result to a place (saved to a file or displayed on the screen). T
poor, you need to download the new version of software to upgrade or use patch files to fix security vulnerabilities. It is a warning that unauthorized use of others' computer systems or theft of others' information is illegal. we hope that readers will not try this way.
In addition to the above methods, many hackers can use intrusion tools to attack Linux syste
SECURECRT software and Linux system. 4, the rational use of Su, sudo command su command: is a tool to switch users, often used to switch the ordinary user to the Superuser, of course, can also switch from the super user to the ordinary user. In order to ensure the security of the server, almost all servers prohibit the superuser to log into the system directly,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.