First, installation and upgradeUse custom to customize the installation, unnecessary packages as far as possible, if necessary to add password restrictions to the Lilo/grub bootloader, after the installation is completed using Up2date, yum or apt
Linux server security is important for protecting user data and intellectual property, while also reducing the time you face hackers. At work, the system administrator is usually responsible for the security of Linux, and in this article, 20
Install Oracle 11gR2 on Debian wheezySource:http://gaiustech.wordpress.com/2013/06/26/howto-install-oracle-on-debian-wheezy/Oracle 11gR2 on Debian still isn ' t an officially supported configuration (10g XE were for a while), but it's perfectly do-
Https://github.com/bitcoin/bitcoin/blob/master/doc/build-unix.md
UNIX Build NOTES
Some notes on the How to builds Bitcoin Core in Unix.
(for OpenBSD specific instructions, BUILD-OPENBSD.MD) Note
Always use absolute paths to configure and compile
This article mainly introduces the method of hiding the server signature on Apache, the example is based on the Linux of Debian department, the friend who need can refer to the
Revealing a Web server's signature with server/php version information
Revealing a Web server's signature with server/php version information can pose a security risk because you are basically telling the attacker about a known vulnerability on your system. Therefore, as a part of the server hardening, it is highly
issue : Whenever the APACHE2 site server returns an error page (for example, 404 page cannot be found, 403 Forbidden page), it displays the site server signature (for example, Apache version number and operating system information) at the bottom of
This book from the Unix/linux system of raw logs (raw log) collection and analysis, and gradually into the log audit and computer forensics link. The book provides a number of cases, each case with a vivid note of the network after the invasion,
Today, when compiling a software program, I found the word "FORTIFY_SOURCE", searched it, and found the ora core security mechanism Introduction page. Turn it over.
Fedora is the thought and action leader in compliance with the latest Linux security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.