linux security book

Want to know linux security book? we have a huge selection of linux security book information on alibabacloud.com

Linux workstation security check list

Linux workstation security check list Target readers This document is intended for users who use Linux workstations to access and manage system administrators in the project infrastructure team. If your team's system administrator is a remote engineer, you can use this document to help them ensure that their workstation meets the most basic

Red Hat Linux Security Settings

. restrict the number of programs with the SUID permission flag. Programs with this permission flag run as root, which is a potential security vulnerability. Of course, some programs must have this flag, like the passwd program. 3. BIOS security. Set the BIOS password and modify the boot sequence to disable system startup from a floppy disk. 4. User Password. User passwords are the most basic starting point

Ten Tips to ensure Linux security

Article Title: Ten Tips to ensure Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Linux has many advantages in terms of

Basic techniques for Linux security management _unix Linux

Basic techniques of Linux security management Chinese information position http://www.cnxxz.net Author: greenice Linux as an open source of the free operating system, with its highly efficient implicit quality, more and more users are welcome, and in the world continues to spread. It is believed that Linux will get big

Linux Service and security management 11th week job "Linux Micro Jobs"

eth0-m multiport-p UDP--dports 53,113,135,137,139,445-j DROP53,113,135,137,139,445 of messages dropped to UDP (primarily DNS, authentication, remote calls, files, and Printer sharing services) to the ETH0 network port# iptables-a input-i eth0-p UDP--dport 1026-j DROPPacket discards for 1026 ports that are accessing UDP on the Eth0 network port (10,261 as the next idle port, preventing port scanning)# iptables-a input-i eth0-m multiport-p tcp--dports 1433,4899-j DROPPacket discards for 1433 (SQL

System security commands required for Linux

Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to Windows, there are many new challenges to ensure the security and reliability of the Linux operating system. This article focuses on Linux system

Viewing the future of Linux security with Crazy Penguin series

Article title: The Crazy Penguin series looks at the future of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Don't think that your

Comprehensively improves the security performance of Linux servers

Article Title: comprehensively improves the security performance of Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. As we all know,

Linux security configuration steps

Brief Introduction to Linux security configuration steps-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Disk partitioning 1. If the system is newly installed, consider the security of Disk Partitions: 1) the ro

Network Security Policies for Small and Medium-sized heterogeneous Linux

Article Title: Network Security Policies for Small and Medium-sized heterogeneous Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. At present, many small and medium users are

Red Hat Linux Security Settings Method _linux

#more/var/log/secure grep refused to check it out. 2. Limit the number of programs with SUID permission flags, the program with that permission flag running as root is a potential security vulnerability, of course, some programs must have the logo, like the passwd program. 3.BIOS security. Setting the BIOS password and modifying the boot order prevents booting the system from the floppy disk. 4. User pa

Linux Security Basics: network configuration commands and linux basic configuration commands

Linux Security Basics: network configuration commands and linux basic configuration commands 1. ifconfig view and configure network interface information(1) set an IP addressIfconfig eth0 192.168.0.1(2) temporarily disable or enable the NICIfconfig eth0 downIfconfig eth0 up(3) set the subnet maskIfconfig eth0 netmask 255.255.255.0(4) view the status of the first

Commands to resolve Linux system security

Although Linux is a multi-user system like the Windows nt/2000 system, there are a number of important differences between them. For many administrators accustomed to Windows systems, there are many new challenges to ensuring that Linux operating systems are secure and reliable. This article will focus on the Linux system sec

Linux Network security Incomplete notes

needFive, Linux physical securityPhysical security protection of the serverSet the password to grub, even if the attacker is physically in contact with the operating systemLocking the terminal with VlockVi. information collection of cyber securityNetwork host Survival TestPingNmapTelnetNetwork host survivability Test protectionInstall the firewall to screen out the ping test.Installs snort time to detect s

Linux security overview

Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. As Linux is an open-source free operating system

Linux system security risks and management methods

There is no absolutely secure system in the world. even a stable Linux system is widely considered to have shortcomings in terms of management and security. We expect the system to work at minimum risk, which requires enhanced management of system security. Next, I will elaborate on the shortcomings of Linux from two a

Past and present of Linux security

Article Title: Past and Present of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Linux itself is not a secure operatin

Block system vulnerabilities to ensure Linux System Security

find users' phones, directories, and other important information. Therefore, many Linux systems cancel all or partially cancel these services to enhance system security. In addition to setting system service items using/etc/Inetd. conf, inetd also uses the/etc/services file to find the ports used by various services. Therefore, you must carefully check the port settings in the file to avoid

Summary of Linux security settings

. User passwords are the most basic starting point for Linux Security. many users use simple 'password', which opens the door to intruders, although theoretically there is no uncertain user password, it can be used as long as there is enough time and resources. A good user password is a string of characters that can only be easily remembered and understood by himself, and should never be written anywhere. 5

Complete Guide to Linux server security audit tools and procedures

BKJIA: Many Linux servers are not new machines just deployed. Professional Linux system administrators perform regular maintenance, IT technicians often need to take full responsibility for the security of their servers. If your server is intruded, not only is all sensitive information exposed, but the server itself may cause larger damage to attackers. To avoid

Total Pages: 15 1 .... 9 10 11 12 13 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.