linux security book

Want to know linux security book? we have a huge selection of linux security book information on alibabacloud.com

Experts take you out of the Linux operating system security misunderstanding

With the increasing number of viruses and hackers on the network, many users are seeking for the safest operating system. When talking about this topic, someone will tell you that the Linux operating system is the safest. In fact, this is just relative.News about Linux operating systems often appears in IT industry publications. Many of the news are about its security

Ensure SSH security on Amazon EC2 Linux host, ec2ssh

Ensure SSH security on Amazon EC2 Linux host, ec2ssh Friends who once worked in startups must be clear that building customer trust is a key step in business development. Today, users are increasingly familiar with technology and security, and they want suppliers to provide strict data protection while ensuring solid and reliable services. In addition, the custom

Security Settings for network services in Linux

The Linux operating system is stable, robust, efficient, and secure. Is becoming an ideal platform for various network services. Various network applications have superior performance applications in the Linux system, such as Apache servers providing Web services, Bind of DNS services, and Postfix, Sendmail, and Qmail of SMTP services; provides FTP services such as Wu-ftp, Vsftp, and Proftp. In addition, mo

Linux system Security Configuration baseline

console”; 2、普通用户可以登录成功,而且可以切换到root用户;配置方法:修改/etc/ssh/sshd_config文件,将PermitRootLogin yes改为PermitRootLogin no,重启sshd服务。适用版本:Linux Redhat AS 3、Linux Redhat AS 4Four: Password complexity policyConfiguration name: Operating system Password Complexity policy configuration requirements: The password is at least 12 bits long and includes numbers, lowercase letters, capitals, and special symbols. Operation

Brief Introduction to Linux kernel Security Intrusion Detection System

Linux Kernel security is gaining more and more attention with the popularity of Linux systems. Here we will introduce LIDS, the Linux kernel security intrusion detection system. Check what problems exist in the Linux kernel and wh

Linux security tips (1)

Article Title: Linux security tips (1 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. To study Linux

Windows and Linux security

The greatest use of aircraft invented for civilian use is to save time and make transportation more convenient and fast. But every time we talk about a plane, it doesn't seem to be about how much time it saves to fly from China to the United States, but about its unquestionable security. This seems to argue with everyone about which of Windows and Linux is better, and will often argue over

Practical security for Linux

Home Linux practical security-Linux general technology-Linux technology and application information, the following is a detailed description. Author: David M Williams Original article: Practical Linux home security Translator: hou

Basic LINUX security management skills

Basic LINUX security management skills China Information position http://www.cnxxz.net Author: greeniceAs a free open-source operating system, Linux is becoming more and more popular among users with its highly efficient and hidden quality. I believe that in the near future, Linux will be more and faster. Although

Ensures system security by monitoring processes in Linux

Article Title: ensures system security by monitoring processes in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. By using user-level top, ps, and other system tools and

System security policies for preventing buffer overflow attacks in Linux

Buffer overflow attacks are currently one of the most common attacks by hackers. To cope with the emerging buffer overflow attacks, we have studied how to prevent Buffer Overflow in Linux, summarizes the security policies for preventing buffer overflow attacks on Linux. These security policies can be applied to interna

Linux security preliminary settings

Article Title: Linux security preliminary settings. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Not long ago, I downloaded the latest kernel version with great patience, but it

Linux user security and Linux PAM authentication mechanism

are two ways to telnet into and local direct access.> Either way when Linux is ready to allow the login user screen to display the system prompt "login:" At this time the user enters the user account after "login". > "passwd:" When the user enters the user account correctly, the user enters the user password after "passwd:".> If the user account and user password are correct, the system prompt "$" or "%" will be entered successfully.> The system Prom

Ensure Linux server security against four levels of attack _linux

With the continuous expansion of Linux enterprise applications. A large number of network servers are using the Linux operating system. The security of Linux servers can be more and more concerned. This is listed here according to the depth of the attack on the Linux server

Linux System Security Protection

Whether you are an ordinary Linux Desktop user or a system administrator managing multiple servers, you are faced with the same problem: an increasing number of threats. Linux is an open system that allows you to find many ready-made programs and tools on the network. This facilitates both users and hackers, because they can also easily find programs and tools to sneak into the

Use of Linux kernel Security Intrusion Detection System

Article Title: about the use of Linux kernel security intrusion detection system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. This section briefly introduces the

How to Ensure linux user security

The increasing expansion of Linux application scope has attracted more and more attention. Security is a complex and extensive problem. Here we mainly focus on Linux User Account Security, especially how Linux system administrators ensure user

Enhance Linux Desktop Security

Enhance Linux Desktop Security Introduction Malicious attacks on computers are becoming increasingly popular. The GNU/Linux virus exists despite the much fewer viruses used to attack the GNU/Linux system than the Windows system. In addition, the number of other types of malware that can infect

10 tips for improving Linux System Security (1)

Linux is a Unix-like operating system. Theoretically, the design of Unix itself has no major security defects. For many years, the vast majority of security problems found on Unix operating systems mainly exist in individual programs. Therefore, most Unix vendors claim to be able to solve these problems and provide secure Unix operating systems. But

Ensures system security by monitoring processes running in Linux

By using user-level top, ps, and other system tools and Linux kernel protection technologies, we can comprehensively protect the security of important system processes and user processes in Linux systems from the user/kernel levels. The Bell-LaPadula model of the classic information confidentiality security model point

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.