store logs.
TIPS: In a Linux system, there are three main log subsystems: (1) connection time logs. Executed by multiple programs, writing records to "/var/log/wtmp" and/"var/run/utmp", login, and other programs to update wtmp and utmp files so that system administrators can track who is logged on to the system.
(2) Process statistics performed by the system kernel. When a process terminates, write a record in the statistics file. The purpose of pr
Linux is a multi-user, multi-process operating system. It provides many system and network services for users. Therefore, from the application perspective, it inevitably requires security authentication for a large number of applications and their users, only users who have passed the Security Authentication can reasonably and legally use the corresponding system
Many people think that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security software or tech
Article Title: familiar with Linux kernel security intrusion detection system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
LIDS (Linux
The first part: RedHat Linux Chapter
1. Overview
Linux Server version: RedHat Linux as
For an open operating system---Linux, system security settings include minimizing system services, restricting remote access, hiding important data, patching
Possible types of attacks on Linux Network
"Denial of Service" Attack
The so-called "Denial of Service" attack means that hackers use destructive methods to block the resources of the target network, temporarily or permanently paralyze the network, so that the Linux network server cannot provide services for normal users. For example, hackers can simultaneously send a large number of consecutive TCP/IP requ
Article Title: How to Implement password security in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: TechRepublic.com
Password
I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences.
As a system administrator, I will talk about linux based on server applications. Since linux on a personal computer may not be the same as on a server,
Fedora has a lot to learn about. Here we mainly introduce Linux security, including Fedora and other aspects. The Linux release of Fedora Core Linux, and Red Hat's original Linux development team will continue to participate in the development of this release.
Article Title: Personal Experience on Linux optimization and security configuration. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Preface:
I have not written any articles f
, and its security can be enhanced at the code level. But it is too complicated for users who are new to Linux. If you want to use Linux as a desktop operating system, the settings must be different from those on the server. The server may be used on the Internet, whether it is its firewall, proxy server or other applications,
Linux system security is guaranteed in many aspects. Here we mainly introduce the knowledge of Linux port security, which involves the setting of Linux ports. Here we summarize some things from the Internet, now let's share it with you. Here, we usually need to pay attention
are two ways to telnet into and local direct access.> Either way when Linux is ready to allow the login user screen to display the system prompt "login:" At this time the user enters the user account after "login". > "passwd:" When the user enters the user account correctly, the user enters the user password after "passwd:".> If the user account and user password are correct, the system prompt "$" or "%" will be entered successfully.> The system Prom
Microsoft WIN10 's first Anniversary update system includes a new Linux subsystem, but security company CrowdStrike points out that this increases the chances of hackers being hacked by Windows users and reduces the security of the system.At the Black Hat Technology conference in progress, Alex Ionescu, a security expe
Thanks to the outstanding functions and reliable stability of the Linux operating system, more and more users are learning and using Linux. In the course of studying and using Linux, I have also collected and sorted out some tips for Linux security management. Now I will mak
Many people think that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security software or tech
Do you want to evaluate the security of Linux without having to go through lengthy installation and configuration processes? In this article, we will introduce four packages: Auditor, Whoppix, Knoppix-STD and phak. After using these packages, you can use LiveCD.A truly secure system can only be shut down and powered off, placed in a closed room in a concrete pouring building, and equipped with police to gua
Many media and experts believe that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security sof
Article Title: Linux System Security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux System
Linux has become more and more popular among computer users. As a result, many people begin to learn about Linux. Today, we will explain how to use BackTrack to check Linux security vulnerabilities. I hope you will learn how to apply BackTrack to check Linux
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.