Linux has many advantages in function, price or performance, however, as an open operating system, it inevitably has some security problems. about how to solve these hidden dangers, to provide a safe operation platform for the application, this article will tell you some of the most basic, most commonly used, but also the most effective tricks.
Linux is a UNIX-li
Although Linux is a multi-user system like the Windows nt/2000 system, there are a number of important differences between them. For many administrators accustomed to Windows systems, there are many new challenges to ensuring that Linux operating systems are secure and reliable. This article will focus on the Linux system sec
private keysSsh-keygen-t RSA (This is the case with test)Enter------------password------Confirm passwordThe first file is a private keyThe second file is a public keyUpload test's private key to Test1.Ssh-copy-idEnter the test1 passwordSuccessfully uploadedSwitch to Test1Cd. SSHLlThe private key of test was foundAt this time we use test to go to the user login test1, need to enter a password, not test1 passwordTurn fromIt Essentials Linux
: Compared to move and copy, replication is more conducive to maintaining SELinux properties, recommended use.4.tar packaged backup with SELinux; special SELinux type:file_t,default_t,user_tmp_tThe default selinux is lost when Tar is packaged, and the SELinux property can be maintained using "--selinux|--xattrs".tar-zcvf/tmp/test-sel.tar.gz/var/www/html/--selinuxSpecial type:file_t: File does not have SELinux attributedefault_t: The SELinux of the file or directory does not match the File-contex
following four kinds:(1) required validation fails, but returns fail(2) Requisite verification failure immediately ends the entire verification process and returns fail(3) Sufficient verification succeeds immediately returns, no longer continues, otherwise ignores the result and continues(4) optional is not used for verification, just display information (usually used for session type)Third, Pam verification process The following is an explanation of the validation sample tableTo Use1 example,
Command:Vim/etc/login.defsDefault settings:# Password Aging controls:## Pass_max_days Maximum Number of days a password is used.# pass_min_days Minimum number of days allowed bet Ween password changes.# pass_min_len Minimum acceptable password length.# pass_warn_age number of Days warning given before a password expires. #PASS_MAX_DAYS 99999pass_min_days 0 Pass_min_len 5 pass_warn_age 7Analytical:Pass_max_days---Password valid days, maximum how long to change
Linux must learn 60 commands (5)-Network securitySubmitted by Zhanjun in Thursday, 2006-04-13 12:42
Linux must learn 60 commands: System security-related commandsLinux must learn system security commands (1)Author: Cao Yuan its dispatch time: 2004.12.03Although Linux is a mu
Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to windows, there are many new challenges to ensure the security and reliability of the Linux operating system. This article focuses on Linux system
Although Linux and WindowsNT/2000 systems are the same multi-user systems, there are many important differences between them. For many habits
Although Linux is a multi-user system like Windows NT/2000, there are many important. For many administrators who are used to Windows, there are many new challenges to ensure the security and reliability of the
lifting hardware).
As a system administrator, I think, first of all, we have to be clear about the idea that any operation on the server, upgrades and modifications to any configuration file or software, must first consider security, not the newer things the better, which is why Linux management feel and Windows different places, Windows first recommended everyone to use its latest version of software and
My comments:This book describes all aspects of linux security and provides a clear line of thinking. This document providesMany helpful security tips are a reference for Linux system maintenance personnel. Through this book, you c
Article Title: who is challenging Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In the operating system, if Windows is described with loopholes, the most common ad
Today, Linux system security becomes more and more important, here I would like to use some of my usual Linux basic security measures written to discuss with you, let our Linux system become reliable.1, the security settings of th
executable permission, here must be sure, otherwise you will regret;
2, replace the original bash is occupied, you can modify the original user's bash environment and then replace.
3. View recently changed files Find the. php file in the current directory that was modified in the last 24 hours, and list the details of find.-name ' *.inc '-mtime 0-ls find the regular files that were modified in the current directory, the last 1 days ago. find.-type f-mtime +1 Note: You
Linux and Security--linux Basic practice one, practice one: Master the maintenance method of the software source, configure the system to use the software source image in the education network. Master the method of finding, installing, uninstalling and updating software through the software source. 1. How to maintain the software sourceThe list of Ubuntu software
In the operating system, if Windows is described with loopholes, the most common adjective about Linux may be "impeccable. When people are increasingly keen on finding Microsoft's operating system and software vulnerabilities, making Windows an increasingly popular target for hackers, but it often ignores the second most popular Linux operating system in the world.
In fact, in 1996, the first virus, Staog,
Article Title: Linux network security policies and protection measures. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. Linux-based n
Linux-based network security policies and protection measures-Linux Enterprise applications-Linux server application information. For details, refer to the following section.
1. Introduction
With the increasing popularity of Internet/Intranet networks, more and more users are using
Many people are learning the Linux operating system, and the computer is essential to the operating system. The development of Linux is very rapid. Here we will introduce the knowledge of Linux, so that you can learn how to use Linux. Today I will talk about the top ten advanced se
Guardian Digital and security Management Service provider (MSSP) Guardent launches new products that will improve the security performance of open source and Linux products.Guardian Digital will launch a new product at the LinuxWorld Fair in New York at the end of this month as a complement to its web-EnGarde secure Linux
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.