linux security best practices

Read about linux security best practices, The latest news, videos, and discussion topics about linux security best practices from alibabacloud.com

Linux system security and application--pam security certification

following four kinds:(1) required validation fails, but returns fail(2) Requisite verification failure immediately ends the entire verification process and returns fail(3) Sufficient verification succeeds immediately returns, no longer continues, otherwise ignores the result and continues(4) optional is not used for verification, just display information (usually used for session type)Third, Pam verification process  The following is an explanation of the validation sample tableTo Use1 example,

"Linux Security" Security Password policy setting

Command:Vim/etc/login.defsDefault settings:# Password Aging controls:## Pass_max_days Maximum Number of days a password is used.# pass_min_days Minimum number of days allowed bet Ween password changes.# pass_min_len Minimum acceptable password length.# pass_warn_age number of Days warning given before a password expires. #PASS_MAX_DAYS 99999pass_min_days 0 Pass_min_len 5 pass_warn_age 7Analytical:Pass_max_days---Password valid days, maximum how long to change

Discussion on the optimization and security of Linux operating system _unix Linux

lifting hardware). As a system administrator, I think, first of all, we have to be clear about the idea that any operation on the server, upgrades and modifications to any configuration file or software, must first consider security, not the newer things the better, which is why Linux management feel and Windows different places, Windows first recommended everyone to use its latest version of software and

LINUX on AZURE security recommendations (top)

This article is personal original, can be freely reproduced, reproduced please indicate the source, thank you!This address: http://www.cnblogs.com/taosha/p/6399554.html1.1Overview IntroductionLinux system is one of the world's most popular server operating systems, using open source, flexible and convenient, version update fast, but because of more branches, free community version of non-commercial operation, lack of after-sales service and security,

Linux on Linux operating system security settings

Today, Linux system security becomes more and more important, here I would like to use some of my usual Linux basic security measures written to discuss with you, let our Linux system become reliable.1, the security settings of th

Linux top 10 Advanced Security Management Skills

Many people are learning the Linux operating system, and the computer is essential to the operating system. The development of Linux is very rapid. Here we will introduce the knowledge of Linux, so that you can learn how to use Linux. Today I will talk about the top ten advanced se

Linux and Security--linux Basic practice

Linux and Security--linux Basic practice one, practice one: Master the maintenance method of the software source, configure the system to use the software source image in the education network. Master the method of finding, installing, uninstalling and updating software through the software source. 1. How to maintain the software sourceThe list of Ubuntu software

Linux network security policies and protection measures

Article Title: Linux network security policies and protection measures. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. 1. Linux-based n

Linux-based network security policies and protection measures

Linux-based network security policies and protection measures-Linux Enterprise applications-Linux server application information. For details, refer to the following section. 1. Introduction With the increasing popularity of Internet/Intranet networks, more and more users are using

Linux companies are increasingly focusing on product security because of the "favor" that hackers have repeatedly received from Linux operating platforms.

Guardian Digital and security Management Service provider (MSSP) Guardent launches new products that will improve the security performance of open source and Linux products.Guardian Digital will launch a new product at the LinuxWorld Fair in New York at the end of this month as a complement to its web-EnGarde secure Linux

Linux Security News: Linux 3.13, systemrescumcm 4, and BackBox 3.13

1) Linux 3.13 Linus Torvalds released Linux Kernel 3.13 some time ago as the opening ceremony in 2014. By convention, this version updates a large number of drivers. In addition, Linux Kernel 3.13 includes nftable, which is the successor of the famous iptables. From the submitted code, nftables continues to use the existing netfilter hooks, Connection Tracing Sys

Overview of Linux kernel security features

Address: https://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security-features Editor's Note: This is a guest post from James Morris, the Linux kernel security subsystem maintainer and manager of the mainline Linux kernel development team at oracle. In this art

Linux system VPS Security and optimization settings collation

add Port 23212 below (save 22 ports, 23212 successful connections and then remove 22, insurance practices) Ii. Continue to find #usedns Yes, change to Usedns No, you can improve the connection speed of SSH; Iii. find #permitrootlogin Yes to Permitrootlogin no prohibit root remote SSH logon Iv. find To #permitemptypasswords No, remove #, prohibit null password login Finally, use: Wq save exit, then perform service sshd restart Restart SSH service

Change Linux default security level _unix Linux with lkm

The Linux default security level is 0, and if you raise it to 1, you can improve the security of the system to some extent. Security level When 1, it disables the modification of the immutable and append-only bits of the files in the EX2FS system, while also prohibiting loading /Remove module. So we can first use chatt

Linux Account Password Expiration security policy settings, linux Account Expiration Policy

Linux Account Password Expiration security policy settings, linux Account Expiration Policy In Linux system management, you sometimes need to set the account password complexity (length), password expiration policy, and so on. This is mainly controlled by some parameters in the/etc/login. defs parameter file. It is mai

Introduction to Linux security mechanisms for Linux gamers (1)

question. This is what I should pay attention to when installing and selecting the release.1. Version SelectionI have been using redhat for a long time. I personally think that redhat. version 0 is the first version of the major version upgrade. Many software packages in this version are not stable and are prone to faults. for administrators, most of linux is used as servers, to be the most server, the most important problem is stability, and the mos

Linux Learning Notes: Security for Linux services and services

, takes out its public key;Verify that the server certificate needs to verify the following:Verify the issuing authority (CA);Verifying the integrity of a certificateVerify the holder information of the certificate;Verify the certificate validity periodVerifying the revocation list for a certificateThe client sends information to the server side:A random number for the public key encryption on the server;The coding format change notification, indicating that the subsequent information will be en

Linux must be learned under the system Security Command 1th/4 page _unix Linux

Although Linux is a multi-user system like the Windows nt/2000 system, there are a number of important differences between them. For many administrators accustomed to Windows systems, there are many new challenges to ensuring that Linux operating systems are secure and reliable. This article will focus on the Linux system sec

Security Configuration of nginx on Linux server, nginx on linux Server

Security Configuration of nginx on Linux server, nginx on linux Server1. Common sense In linux, to read a file, you must first have the execution permission on the folder where the file is located, and then read the file. The execution of php files does not require the execution permission of the files. You only nee

Operating system security precaution brief: Linux Chapter _unix Linux

Linux as a free, open symbol, more and more users of the attention, but the real use of less personal users, mainly because of its system characteristics, and the surrounding software developers less, so that it only in the server system in the field of popularity. It's security protection, I do a little introduction: 1. Prohibit access to important files Linux

Total Pages: 15 1 .... 8 9 10 11 12 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.