linux security book

Want to know linux security book? we have a huge selection of linux security book information on alibabacloud.com

Linux system security-installation and configuration

With the increasing popularity of networks, security issues have attracted more and more attention. Linux, as a free open-source operating system, is increasingly used as a server platform. With the diversity of application software in Linux, many people (including the author) also like to use Linux as a desktop. In th

Discussion on security protection of Linux system

store logs. TIPS: In a Linux system, there are three main log subsystems: (1) connection time logs. Executed by multiple programs, writing records to "/var/log/wtmp" and/"var/run/utmp", login, and other programs to update wtmp and utmp files so that system administrators can track who is logged on to the system. (2) Process statistics performed by the system kernel. When a process terminates, write a record in the statistics file. The purpose of pr

What security policies can you think of when Linux systems are installed?

-------------------------------------------------------------------------Configure the SSH logging feature to record who has logged in to your server via SSHIn the last write:Sshd:ALL:spawn echo ' Date '%c access my sshd >>/etc/sshlogSpawn indicates that the following command is executed' Date ' represents the command to execute date, showing the time of the current system%c indicates the user source IP address----------------------------------------------------------------------------------5, i

Use capability features to enhance Linux System Security

Abstract: The Access Control Model for traditional UNIX systems is very simple-for common users, Super Users. In this model, a process or account has either very small permissions or all system permissions. Obviously, this is of no benefit to system security. Starting from the Linux-2.1 kernel, the concept of capacity is introduced to achieve more fine-grained access control. 1. Introduction UNIX is a secur

Introduction to important Linux security commands (III)

The preceding important Linux security commands involve important commands for user and file permissions. Today we will introduce the chattr, sudo, ps, and who commands. Here we have completed all the important Linux security commands, and hope this course will help you. VII. chattr 1. Role Modify the attributes of th

Nine tips can effectively enhance Linux Desktop Security

Many people think that Linux is safer than Windows. However, today, security is even more important. This kind of security still requires the correct configuration of users. This kind of security does not have to be achieved through some specialized security software or tech

Security tools in Linux

All software shall comply with [software management regulations] Anti-virus software: Ravlin8-8.1-4.i386.rpm (searchable download, Free Software pause download)Category: System Security upload time:Version: 2.19 MBSubmitted by: UK patient score: 91% goodRelated urls:Brief description:This can be installed! Command is: rpm-IVH ravlin8-8.1-4.i386.rpm -- force registration number is: SSHDD-SDY4P-3CDLL-IDJDL Free anti-virus software clam antiviru in

Linux Server Security Configuration _linux

The first part: RedHat Linux Chapter 1. Overview Linux Server version: RedHat Linux as For an open operating system---Linux, system security settings include minimizing system services, restricting remote access, hiding important data, patching

Linux operating system optimization and security

I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences. As a system administrator, I will talk about linux based on server applications. Since linux on a personal computer may not be the same as on a server,

Of course, it focuses on Linux security.

Fedora has a lot to learn about. Here we mainly introduce Linux security, including Fedora and other aspects. The Linux release of Fedora Core Linux, and Red Hat's original Linux development team will continue to participate in the development of this release.

Install/etc/security/limits. conf in linux.

Install/etc/security/limits. conf in linux. In linux, Oracle is usually installed with/etc/security/limits. conf file, but the specific meaning here may not be everyone's. At the beginning, I didn't clear it very much. I only knew to modify it. Every installation can follow the configuration in the document. Today, I

Linux SECURITY: Step by Step (1) (1)

, and its security can be enhanced at the code level. But it is too complicated for users who are new to Linux. If you want to use Linux as a desktop operating system, the settings must be different from those on the server. The server may be used on the Internet, whether it is its firewall, proxy server or other applications,

Measure the test taker's knowledge about port security in Linux.

Linux system security is guaranteed in many aspects. Here we mainly introduce the knowledge of Linux port security, which involves the setting of Linux ports. Here we summarize some things from the Internet, now let's share it with you. Here, we usually need to pay attention

[System Security] uses LIDS to build a steel castle in LINUX

Article Title: [System Security] using LIDS to build a LINUX steel Castle. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. With the continuous promotion of

Linux System Security Protection

Whether you are an ordinary Linux Desktop user or a system administrator managing multiple servers, you are faced with the same problem: an increasing number of threats. Linux is an open system that allows you to find many ready-made programs and tools on the network, which facilitates both users and hackers. So how can we protect Linux system

VNC Remote Management Linux Server Security Guide

Article Title: VNC remote management of Linux server security guide. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems and open source, and other basic categories in the Open Source Field, remote control technology is represe

How to set the Linux security environment for executing Java programs

Article Title: how to set the Linux security environment for Java program execution. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Enterprise Java expert Dennis Sosnoski elaborate

Black Hat Expert: WIN10 embedded Linux subsystem faces security risks

Microsoft WIN10 's first Anniversary update system includes a new Linux subsystem, but security company CrowdStrike points out that this increases the chances of hackers being hacked by Windows users and reduces the security of the system.At the Black Hat Technology conference in progress, Alex Ionescu, a security expe

Linux security management measures

Thanks to the outstanding functions and reliable stability of the Linux operating system, more and more users are learning and using Linux. In the course of studying and using Linux, I have also collected and sorted out some tips for Linux security management. Now I will mak

How to use Linux LiveCD to evaluate system security (1)

Do you want to evaluate the security of Linux without having to go through lengthy installation and configuration processes? In this article, we will introduce four packages: Auditor, Whoppix, Knoppix-STD and phak. After using these packages, you can use LiveCD.A truly secure system can only be shut down and powered off, placed in a closed room in a concrete pouring building, and equipped with police to gua

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.