linux security best practices

Read about linux security best practices, The latest news, videos, and discussion topics about linux security best practices from alibabacloud.com

Summary of Common commands in Linux (7) Security Settings and Common commands in linux

Summary of Common commands in Linux (7) Security Settings and Common commands in linux Security Settings Category Command Option Annotation Security PolicySelinux Setenforce Number (0, 1) Set selinux status, 0 c

Top 10 Enterprise Linux Server Security Protection points

With the prevalence of open-source Linux, its applications in large and medium-sized enterprises are gradually becoming more popular. Many enterprise application services are built on it, such as Web services, database services, and cluster services. Therefore, the security of Linux has become a foundation for enterprises to build secure applications and a top pr

Linux History Security Issue "save records Prevent deletion" + Perfect Linux/unix audit log each shell command

] ~]#/etc/profile or [[email protected] ~] #source/etc/profileMake the change effective, if there is no error stating the success.Verify that there is data in the log[Email protected] ~]# More/var/log/201107.log2011-07-21 17:29:08 ##### Root PTS/2 (192.168.23.250) # # # # # # # /etc/profileYou can see that there's already data inside.You can also usePrompt_command= ' {date ' +%y-%m-%d%T ##### USER: $USER IP: $SSH _client PS: $SSH _tty # # (History 1 | {read x cmd; echo "$cmd";}) ";} >> $HISTORY

In linux, how is security? Vt6102? Card ?? Sakura? Red Union Linux System Portal

In linux, how is security? Vt6102? Card ?? Sakura? -Linux general technology-Linux technology and application information. For details, refer to the following section. This is the instruction file in the downloaded driver. Via pci 10/100 Mb Fast Ethernet Adapter ** ** Linux

Making Linux safer -- Thinking about security

Article Title: making Linux safer-thinking about security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.    Security Definition

Essentials of Enterprise Linux Server security protection

With the popularity of Linux in Open source system, its application in large and medium-sized enterprises is becoming more and more popular, many enterprise application services are built on it, such as Web services, database services, cluster services and so on. Therefore, the security of Linux has become an enterprise to build a

Linux and Security "Linux kernel Design and implementation" chapter--20135227 Huang

processes. Kernel (System State, enter kernel space execution, run in process context), application process (user state, go into user space execution, run in kernel space). The processor runs at any time in one of the following three states: Runs in user space, executes user processes, runs in kernel space, is in the process context, executes on kernel processes, runs in kernel space, is in an interrupt context, and handles interrupts. Such as:The kernel of

Red Hat Linux Security Settings

. restrict the number of programs with the SUID permission flag. Programs with this permission flag run as root, which is a potential security vulnerability. Of course, some programs must have this flag, like the passwd program. 3. BIOS security. Set the BIOS password and modify the boot sequence to disable system startup from a floppy disk. 4. User Password. User passwords are the most basic starting point

Ten Tips to ensure Linux security

Article Title: Ten Tips to ensure Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Linux has many advantages in terms of

Linux Service and security management 11th week job "Linux Micro Jobs"

eth0-m multiport-p UDP--dports 53,113,135,137,139,445-j DROP53,113,135,137,139,445 of messages dropped to UDP (primarily DNS, authentication, remote calls, files, and Printer sharing services) to the ETH0 network port# iptables-a input-i eth0-p UDP--dport 1026-j DROPPacket discards for 1026 ports that are accessing UDP on the Eth0 network port (10,261 as the next idle port, preventing port scanning)# iptables-a input-i eth0-m multiport-p tcp--dports 1433,4899-j DROPPacket discards for 1433 (SQL

Comprehensively improves the security performance of Linux servers

Article Title: comprehensively improves the security performance of Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. As we all know,

Linux security configuration steps

Brief Introduction to Linux security configuration steps-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Disk partitioning 1. If the system is newly installed, consider the security of Disk Partitions: 1) the ro

Network Security Policies for Small and Medium-sized heterogeneous Linux

Article Title: Network Security Policies for Small and Medium-sized heterogeneous Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. At present, many small and medium users are

Linux Learning Essay 3 Linux Security

executable permission, here must be sure, otherwise you will regret; 2, replace the original bash is occupied, you can modify the original user's bash environment and then replace. 3. View recently changed files  Find the. php file in the current directory that was modified in the last 24 hours, and list the details of find.-name ' *.inc '-mtime 0-ls find the regular files that were modified in the current directory, the last 1 days ago. find.-type f-mtime +1 Note: You

Network Security: IDS intrusion detection tool in Linux

This article briefly introduces several Linux IDS intrusion detection tools, such as psad, Apparmor, and SELinuxu. First, let's take a look at the principles and practices of the intrusion detection system. If you only have one computer, it is entirely possible for you to spend a lot of time carefully reviewing system vulnerabilities and problems. Maybe you don't really want this, but it does. However, in t

Linux security overview

Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. As Linux is an open-source free operating system

Viewing the future of Linux security with Crazy Penguin series

Article title: The Crazy Penguin series looks at the future of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Don't think that your

Linux system security risks and management methods

There is no absolutely secure system in the world. even a stable Linux system is widely considered to have shortcomings in terms of management and security. We expect the system to work at minimum risk, which requires enhanced management of system security. Next, I will elaborate on the shortcomings of Linux from two a

Past and present of Linux security

Article Title: Past and Present of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Linux itself is not a secure operatin

Block system vulnerabilities to ensure Linux System Security

find users' phones, directories, and other important information. Therefore, many Linux systems cancel all or partially cancel these services to enhance system security. In addition to setting system service items using/etc/Inetd. conf, inetd also uses the/etc/services file to find the ports used by various services. Therefore, you must carefully check the port settings in the file to avoid

Total Pages: 15 1 .... 9 10 11 12 13 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.