Linux Security Modules

Read about linux security modules, The latest news, videos, and discussion topics about linux security modules from alibabacloud.com

Three major development trends of cloud Platform security

This article from today's information security industry separatist, with the three features of enclosure and hardware, this paper analyzes the increasingly serious gap between information security and cloud platform with typical cloud platform architecture, and puts forward corresponding solutions, that is, three development trends of information security: the defense of information security itself in depth (Defense in Depth), software defined by the combination of application and information security, defines information security (Software tabbed infomation), combines virtualization technology and information security to drive ...

Private collection: Seven open source Linux Network Service System

For small and medium-sized enterprises, there are many free and open source router and firewall solutions, even as a business choice.   Many of these products offer LAN services, such as VPN services, hotspot gateways, and the use of mandatory network portals to share wireless networks. Here, the editors find open source and free router projects that are suitable for businesses that include small businesses, midsize, and even the size of Cisco and Juniper.  Gossip Less, we look at these seven open source and free Linux network operating system. &nb ...

Best Linux Virtual Host space recommendation

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall Nowadays, many personal blogs, The personal website and the small and medium-sized Enterprise webmaster All choose the Linux virtual host to hold their own website, because Linux besides its open source and the free characteristic, but also can well support based on the PHP+MYSQL website development, the more limited function, for the website ...

Monitor your Linux server with a monitoring treasure (attached photos)

In the http://www.unixbar.net/see the use of monitoring Treasure monitor server, feel good, on the installation of a configuration, the following describes the specific installation Method! Monitoring treasure using the standard SNMP protocol to provide users with server monitoring, which means that the monitored server must run the SNMP agent (SNMPD), then we will detail how to install, open the SNMP agent on the Linux server, and make the necessary security configuration, Nginx monitoring and server i/o,cpu load, ...

2014 Linux Virtual host recommended

Intermediary trading http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall hymns New Year, For the selection of the host and the tangle of webmaster recommend a popular Linux virtual host, for you webmaster reference. 3721.html ">2014 year Linux virtual host recommended hymns Spring, the New year has come, in ...

Sun releases security code for cloud Computing Security Alliance

Sun Microsystems recently released its innovative, Open-source cloud computing security tool and announced its support for the latest security specification for the Cloud Computing Security Alliance (Cloud).   The move is part of Sun's strategy to help customers and partners create an open, interoperable public cloud and private cloud. Sun is committed to providing the best technology and practice to help users escort key data in the enterprise and cloud. Sun's cloud computing security Structured module ...

Cloud computing, virtualization, and SDN increase firewall security complexity

Over the past few decades, firewalls have been a port-based guardian of the Internet.   Now vendors are scrambling to roll out so-called "next-generation firewalls" because these "application-aware" firewalls can monitor and control access based on application usage. In addition, many firewalls have added more and more features to try to discover the 0 attacks, including intrusion prevention systems (IPS), web filtering, VPN, data loss protection, malware filtering, and even threat detection sandbox. For a separate IPs, because of its application control, it may be called "Next Generation IPs" ...

How to do a good job of server security protection, information security protection?

According to CNNIC's report, as of December 2013, the number of websites in China reached 3.2 million, an increase of 520,000 over the previous year, an increase of 19.4%. However, according to the latest Baidu survey, 65% Chinese websites are in an unsafe condition, of which 31% are in moderate or high crisis situations. In such a harsh situation of information security, how to do a good job of server security protection, to protect the information security? Today, I chose the cloud lock, acceleration music, security treasure, 360 website guards which four market comparison ...

Support Cloud Alliance Sun launches cloud security tool today

Sun Microsystems today unveiled innovative, open source cloud computing security tools and announced support for the latest security specification for the Cloud Computing Security Alliance (Cloud). The move is part of Sun's strategy to help customers and partners create an open, interoperable public cloud and private cloud. Sun is committed to providing the best technology and practice to help users escort key data in the enterprise and cloud. The release of Sun's cloud-safe structured modules will be used for ...

The hottest 11 open source security tools on GitHub

Malware analysis, penetration testing, and computer forensics - GitHub hosts a host of compelling security tools that address the real needs of computing environments of all sizes. As the cornerstone of open source development, "all holes are superficial" has become a well-known principle or even a credo. As widely known as Linus's law, the theory that open code can improve the efficiency of project vulnerability detection is also widely accepted by IT professionals when discussing the security benefits of the open source model. Now, with the popularity of GitHub ...

Total Pages: 4 1 2 3 4 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.