Discover best linux security software, include the articles, news, trends, analysis and practical advice about best linux security software on alibabacloud.com
Linux basics-linux software management RPM
Because the basics of linux are explained based on CentOS, it is about the software package management on CentOS. Ubuntu software package management includes: ubuntu
Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As Linux is an open-source free operating system
than 40 years ago, even though we still rely on operating systems designed decades ago.
This is the challenge for Linux developers. To ensure Linux security, software engineers must insert security components around the Linux ker
security in the computing field.
Platform-independent environments such as OpenOffice.org, Perl, and Firefox are not spared. For example, Dropper. MsPMs-a malicious Java archive (JAR) file was found on machines running Windows, Mac OS X, and Linux.
Some malicious packages are specially written for GNU/Linux. Rootkit is a collection of tools that allow attackers
sell after-sales services. Therefore, the free software they use can be downloaded on their website (of course, the tool software developed by each vendor is not the GPL authorization software !). However, you can purchase their Linux CD. if you purchase the CD, they will provide the relevant manual instruction files,
As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, whic
measures may be required. In the complete security audit process, we can connect our Linux server hard disk to another computer and check all the files on it manually or using mainstream Linux anti-virus software. In some cases, if the server suffers a serious fault, starting the computer through an external hard disk
copies/etc/passwd and then uses the dictionary file to unlock the password.
20. Thieves covet root permissions through Super User programs such as su or sudo.
21. Hackers often use Buffer overflow to manually intrude into the system.
22. cron is a tool used by Linux to automatically execute commands, such as regular backup or deletion of expired files. Intruders often use cron To leave backdoors. In addition to regularly executing broken decoding to
related derivative of the Java language. CLR may allow C # to be used on many platforms. CLR also provides many JVM execution-time security features (despite escaping from the exit that seriously weakens security assurance ). Microsoft. Net also supports the option to pre-compile the code into the local program for faster startup, which is the same as what GCJ does for Java bytecode. Of course,
cause any problems. In many cases, the entire/usr directory tree should also have unchangeable attributes. In fact, in addition to the chattr-R + ii/usr/command for the/usr directory, you can also use the ro option in the/etc/fstab file, load the partition of the/usr directory in read-only mode. In addition, setting the system log file to only append-only makes it impossible for intruders to erase their traces. Of course, if you use this security mea
system through MD5 verification. it also scans the server to find the loaded rootkit at the kernel level.
Call server drive from external Mount
The steps mentioned above are more than enough to cope with the risks in most Linux Server deployment, including web pages, emails, DNS and database tasks. however, if our Linux server stores sensitive information such as financial or important confidential files,
Home Linux practical security-Linux general technology-Linux technology and application information, the following is a detailed description. Author: David M Williams
Original article: Practical Linux home security
Translator: hou
, takes out its public key;Verify that the server certificate needs to verify the following:Verify the issuing authority (CA);Verifying the integrity of a certificateVerify the holder information of the certificate;Verify the certificate validity periodVerifying the revocation list for a certificateThe client sends information to the server side:A random number for the public key encryption on the server;The coding format change notification, indicating that the subsequent information will be en
software packages
During system planning, the general principle is to remove all unnecessary services. By default, Linux is a powerful system that runs many services. However, many services are not required and may cause security risks. This file is/etc/inetd. conf, which defines the services to be listened to by/usr/sbin/inetd. you may only need two of them: te
security measures may be required. in the complete security audit process, we can connect our Linux server hard disk to another computer and check all the files on it manually or using mainstream Linux anti-virus software. in some cases, if the server suffers a serious faul
Linux as a free, open symbol, more and more users of the attention, but the real use of less personal users, mainly because of its system characteristics, and the surrounding software developers less, so that it only in the server system in the field of popularity. It's security protection, I do a little introduction:
1. Prohibit access to important files
on many platforms. CLR also provides many JVM execution-time security features (despite escaping from the exit that seriously weakens security assurance ). Microsoft. Net also supports the option to pre-compile the code into the local program for faster startup, which is the same as what GCJ does for Java bytecode. Of course, Linux users cannot directly use this
As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, whic
Thanks to the excellent network functions of the Linux operating system, most website servers on the Internet use Linux as the main operating system. However, because the operating system is a multi-user operating system, Hackers often choose Linux as the first target to attack in order to hide themselves in the attack. So, as a
Article Title: Linux security and LIDS. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
LIDS (Linux Intrusion Detection System) is a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.