Understanding Linux Security

Want to know understanding linux security? we have a huge selection of understanding linux security information on alibabacloud.com

Talking about using Linux host to build website notice

With the http://www.aliyun.com/zixun/aggregation/14840.html "> virtual host prices are falling, low-cost virtual host in the ranks of the overseas host is one.   As we all know, overseas host is generally a Linux host, why, Linux host operating system is a free open source program, the copyright is extremely strict foreign countries to use Linux operating system can save a large amount of licensing costs, and thus reduce operating costs. &n ...

Cloud and data security practices at ISC 2014 (free admission)

Oscar-winning actress photos of bulk leakage, UPS user information stolen, mobile devices have security vulnerabilities, many security risks caused people's concern. The development of the Internet, Google Glasses, smart watches, such as wearable equipment has been the advent of the industry's hot debate, they bring convenience at the same time also violate the user's privacy. By the National Computer Network emergency Treatment Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 Internet Security Center and China Internet Association Network and Information Security Work Committee sponsored by China Internet Security ...

Cloud computing security issues

Cloud computing is already a very hot concept, involving a very large number of services, flexible computing services, file storage services, relational database services, key-value database services, and many others. This article will briefly explain the security issues of elastic computing services, as flexible computing is the most commonly used cloud service and also the cloud service with the highest security risk. 1. Introduction Since many things involve corporate secrets, technical details, implementation or new directions, this article does not explain. Interested can vote for a resume, we work together for cloud computing. 2....

Open source software development and software security issues (1)

A discussion about Microsoft Windows and Linux based operating systems is sweeping the internet. The discussion involved many people with vested interests and partiality. The discussion was heated by the confusion of the discussion due to the lack of understanding and misunderstanding caused by logic mistakes. The demand for advertising strategies is expected to give the sponsors more attention, and the use of collated statistical data in the allocation of papers is too obvious authority and objectivity to support the discussion with prejudice and questionable facts. Part of the reason for this lack of certainty is that the debate seems to be never-ending, partly because of the safety of ...

Suspected Microsoft chestnuts SCO shook Linux camp

"SCO has become increasingly aggressive in speech and refuses to show any evidence of the lawsuit, and everything seems to indicate that SCO is simply talking and speaking in the tiger's skin." But Microsoft will never give up such a good opportunity to use these raving words. "In 2003," to Linux to launch a "fear War"?  Bruce Perens, author of Brousse Perence, evaluates SCO. In March 2003, SCO, the owner of a self-proclaimed UNIX operating system, filed a lawsuit against IBM for $1 billion in compensation.

Cloud security Architecture design and Practice Tour

In the coming months, Aliyun will also work with the technology media community such as Infoq to open a cloud technology course in 12 cities across the country, communicating face-to-face with lecturers to make developers truly understand cloud computing and better use cloud computing.   Although Aliyun the pace of the classroom a little later, but we will carefully walk every step, welcome to pay attention to Aliyun Open class, I hope we do not miss! This issue of the public class we invite to Aliyun flying Systems Two senior security experts Li (nickname) and Yang Mengzhe (nickname Mengjie), two lecturers on the "cloud computing security system in the sandbox ..."

A simple understanding of the fundamentals and advantages of open source frameworks

When it consulting firm Opencredo plans to deliver three new applications to a major insurer in seven months, it has set itself three goals: shortening development time, allowing frequent customer changes, and architecting a system that can handle unpredictable traffic spikes. CEO Russel Miles believes that with the help of cloud foundry open source framework and other Open-source software, Opencredo has done "some heavy work", such as configuring virtual machines and adjusting storage volumes ...

CentOS Web Server Security Configuration Guide

In this chapter we will introduce the CentOS http://www.aliyun.com/zixun/aggregation/17117.html ">web server security settings, which is also a number of the most important security settings for Web services, As the administrator of the server we should develop a good system maintenance habits, regular patching, for the directory permission settings should have a very clear understanding of the user and user group management should also develop good habits, if you are just see this article ...

Cloud Computing Guide: Management, architecture, security, networking, and services

One, the charm of the management of cloud computing is that users can start using their ID card and credit card, but that's the problem. Such a simple service is bound to bring many challenges to the unprepared IT department.   We've been through this many times before: the benefits of a technology that are easy to use end up being an unexpected management challenge, such as virtualization, which causes virtual machines to become fragmented, new security risks to smartphones, and instant messaging that triggers corporate governance problems. This article is intended to show IT managers how to maximize cloud computing ...

Big data brings it big challenge security consolidation is the key

As social networks rise, mobile interconnection develops rapidly, data sensor applications and cloud computing bring about a new round of data concentration, and there has been an explosion of "data" in this era. According to statistics, The number of Internet users in 2011 has reached 350 million, which is expected to break 500 million this year; there are about 1 trillion networked devices around the world; over the past decade, global servers have increased twice times, global servers have reached 31.9 million, and 2012 digital data has reached 2.7. ZB, 48% more than 2011 ... Now ...

Total Pages: 7 1 2 3 4 5 .... 7 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.