best linux security software

Discover best linux security software, include the articles, news, trends, analysis and practical advice about best linux security software on alibabacloud.com

Linux basics-linux software management RPM

Linux basics-linux software management RPM Because the basics of linux are explained based on CentOS, it is about the software package management on CentOS. Ubuntu software package management includes: ubuntu

Linux security overview

Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. As Linux is an open-source free operating system

Past and present of Linux security

than 40 years ago, even though we still rely on operating systems designed decades ago. This is the challenge for Linux developers. To ensure Linux security, software engineers must insert security components around the Linux ker

Enhance Linux Desktop Security

security in the computing field. Platform-independent environments such as OpenOffice.org, Perl, and Firefox are not spared. For example, Dropper. MsPMs-a malicious Java archive (JAR) file was found on machines running Windows, Mac OS X, and Linux. Some malicious packages are specially written for GNU/Linux. Rootkit is a collection of tools that allow attackers

One-day learning of open-source Linux software and related organizations

sell after-sales services. Therefore, the free software they use can be downloaded on their website (of course, the tool software developed by each vendor is not the GPL authorization software !). However, you can purchase their Linux CD. if you purchase the CD, they will provide the relevant manual instruction files,

To ensure Linux system security, start with preventing Vulnerabilities

As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, whic

Complete Guide to Linux server security audit tools and procedures

measures may be required. In the complete security audit process, we can connect our Linux server hard disk to another computer and check all the files on it manually or using mainstream Linux anti-virus software. In some cases, if the server suffers a serious fault, starting the computer through an external hard disk

Linux system security risks and management methods

copies/etc/passwd and then uses the dictionary file to unlock the password. 20. Thieves covet root permissions through Super User programs such as su or sudo. 21. Hackers often use Buffer overflow to manually intrude into the system. 22. cron is a tool used by Linux to automatically execute commands, such as regular backup or deletion of expired files. Intruders often use cron To leave backdoors. In addition to regularly executing broken decoding to

Set the Linux security environment for Java execution

related derivative of the Java language. CLR may allow C # to be used on many platforms. CLR also provides many JVM execution-time security features (despite escaping from the exit that seriously weakens security assurance ). Microsoft. Net also supports the option to pre-compile the code into the local program for faster startup, which is the same as what GCJ does for Java bytecode. Of course,

Linux File System Security Strategy

cause any problems. In many cases, the entire/usr directory tree should also have unchangeable attributes. In fact, in addition to the chattr-R + ii/usr/command for the/usr directory, you can also use the ro option in the/etc/fstab file, load the partition of the/usr directory in read-only mode. In addition, setting the system log file to only append-only makes it impossible for intruders to erase their traces. Of course, if you use this security mea

Linux server security audit tools and procedures

system through MD5 verification. it also scans the server to find the loaded rootkit at the kernel level. Call server drive from external Mount The steps mentioned above are more than enough to cope with the risks in most Linux Server deployment, including web pages, emails, DNS and database tasks. however, if our Linux server stores sensitive information such as financial or important confidential files,

Practical security for Linux

Home Linux practical security-Linux general technology-Linux technology and application information, the following is a detailed description. Author: David M Williams Original article: Practical Linux home security Translator: hou

Linux Learning Notes: Security for Linux services and services

, takes out its public key;Verify that the server certificate needs to verify the following:Verify the issuing authority (CA);Verifying the integrity of a certificateVerify the holder information of the certificate;Verify the certificate validity periodVerifying the revocation list for a certificateThe client sends information to the server side:A random number for the public key encryption on the server;The coding format change notification, indicating that the subsequent information will be en

Linux security strategy server and network equipment maintenance

software packages During system planning, the general principle is to remove all unnecessary services. By default, Linux is a powerful system that runs many services. However, many services are not required and may cause security risks. This file is/etc/inetd. conf, which defines the services to be listened to by/usr/sbin/inetd. you may only need two of them: te

Linux server security audit tools and procedures

security measures may be required. in the complete security audit process, we can connect our Linux server hard disk to another computer and check all the files on it manually or using mainstream Linux anti-virus software. in some cases, if the server suffers a serious faul

Operating system security precaution brief: Linux Chapter _unix Linux

Linux as a free, open symbol, more and more users of the attention, but the real use of less personal users, mainly because of its system characteristics, and the surrounding software developers less, so that it only in the server system in the field of popularity. It's security protection, I do a little introduction: 1. Prohibit access to important files

Set the Linux security environment for Java execution

on many platforms. CLR also provides many JVM execution-time security features (despite escaping from the exit that seriously weakens security assurance ). Microsoft. Net also supports the option to pre-compile the code into the local program for faster startup, which is the same as what GCJ does for Java bytecode. Of course, Linux users cannot directly use this

Six Elements of Linux Server Security

As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, whic

11. Good practices for ensuring Linux System Security

Thanks to the excellent network functions of the Linux operating system, most website servers on the Internet use Linux as the main operating system. However, because the operating system is a multi-user operating system, Hackers often choose Linux as the first target to attack in order to hide themselves in the attack. So, as a

Linux security and LIDS

Article Title: Linux security and LIDS. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. LIDS (Linux Intrusion Detection System) is a

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.