linux security best practices

Read about linux security best practices, The latest news, videos, and discussion topics about linux security best practices from alibabacloud.com

Discussion on security protection of Linux system

store logs. TIPS: In a Linux system, there are three main log subsystems: (1) connection time logs. Executed by multiple programs, writing records to "/var/log/wtmp" and/"var/run/utmp", login, and other programs to update wtmp and utmp files so that system administrators can track who is logged on to the system. (2) Process statistics performed by the system kernel. When a process terminates, write a record in the statistics file. The purpose of pr

Are you using the advanced security authentication mechanism in Linux?

Linux is a multi-user, multi-process operating system. It provides many system and network services for users. Therefore, from the application perspective, it inevitably requires security authentication for a large number of applications and their users, only users who have passed the Security Authentication can reasonably and legally use the corresponding system

Nine tips can effectively enhance Linux Desktop Security

Many people think that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security software or tech

Familiar with Linux kernel Security Intrusion Detection System

Article Title: familiar with Linux kernel security intrusion detection system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. LIDS (Linux

Linux Server Security Configuration _linux

The first part: RedHat Linux Chapter 1. Overview Linux Server version: RedHat Linux as For an open operating system---Linux, system security settings include minimizing system services, restricting remote access, hiding important data, patching

Possible Linux Network Attacks and security defense policies

Possible types of attacks on Linux Network "Denial of Service" Attack The so-called "Denial of Service" attack means that hackers use destructive methods to block the resources of the target network, temporarily or permanently paralyze the network, so that the Linux network server cannot provide services for normal users. For example, hackers can simultaneously send a large number of consecutive TCP/IP requ

How to Implement password security in Linux

Article Title: How to Implement password security in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Author: TechRepublic.com    Password

Linux operating system optimization and security

I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences. As a system administrator, I will talk about linux based on server applications. Since linux on a personal computer may not be the same as on a server,

Of course, it focuses on Linux security.

Fedora has a lot to learn about. Here we mainly introduce Linux security, including Fedora and other aspects. The Linux release of Fedora Core Linux, and Red Hat's original Linux development team will continue to participate in the development of this release.

Linux optimization and Security Configuration

Article Title: Personal Experience on Linux optimization and security configuration. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.    Preface:    I have not written any articles f

Linux SECURITY: Step by Step (1) (1)

, and its security can be enhanced at the code level. But it is too complicated for users who are new to Linux. If you want to use Linux as a desktop operating system, the settings must be different from those on the server. The server may be used on the Internet, whether it is its firewall, proxy server or other applications,

Measure the test taker's knowledge about port security in Linux.

Linux system security is guaranteed in many aspects. Here we mainly introduce the knowledge of Linux port security, which involves the setting of Linux ports. Here we summarize some things from the Internet, now let's share it with you. Here, we usually need to pay attention

Linux user security and Linux PAM authentication mechanism

are two ways to telnet into and local direct access.> Either way when Linux is ready to allow the login user screen to display the system prompt "login:" At this time the user enters the user account after "login". > "passwd:" When the user enters the user account correctly, the user enters the user password after "passwd:".> If the user account and user password are correct, the system prompt "$" or "%" will be entered successfully.> The system Prom

Black Hat Expert: WIN10 embedded Linux subsystem faces security risks

Microsoft WIN10 's first Anniversary update system includes a new Linux subsystem, but security company CrowdStrike points out that this increases the chances of hackers being hacked by Windows users and reduces the security of the system.At the Black Hat Technology conference in progress, Alex Ionescu, a security expe

Linux security management measures

Thanks to the outstanding functions and reliable stability of the Linux operating system, more and more users are learning and using Linux. In the course of studying and using Linux, I have also collected and sorted out some tips for Linux security management. Now I will mak

Nine tips to enhance Linux Desktop Security

Many people think that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security software or tech

How to use Linux LiveCD to evaluate system security (1)

Do you want to evaluate the security of Linux without having to go through lengthy installation and configuration processes? In this article, we will introduce four packages: Auditor, Whoppix, Knoppix-STD and phak. After using these packages, you can use LiveCD.A truly secure system can only be shut down and powered off, placed in a closed room in a concrete pouring building, and equipped with police to gua

Some inconspicuous Measures to Ensure Linux Desktop Security

Many media and experts believe that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security sof

Linux System Security

Article Title: Linux System Security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Linux System

Easily apply BackTrack to check Linux Security Vulnerabilities

Linux has become more and more popular among computer users. As a result, many people begin to learn about Linux. Today, we will explain how to use BackTrack to check Linux security vulnerabilities. I hope you will learn how to apply BackTrack to check Linux

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.