Article Title: ensures system security by monitoring processes running in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
By using user-level top, ps, and other system tools
In this article, I will discuss how to configure a Unix client based on the Network File System and use Kerberos security verification through the rpcsec_gss protocol to connect to a Windows Server under the Network File System.
Traditional Network File System clients and servers use
Buffer overflow attacks are currently one of the most common attacks by hackers. to cope with the emerging buffer overflow attacks, we have studied how to prevent buffer overflow in Linux, summarizes the security policies for preventing buffer overflow attacks on the Linux platform. these security policies can be applied to internal enterprise servers.
Buffer overflow attacks are currently one of the most c
Virtualization technology enables multiple operating systems to run application software on the same computer, which can better manage and use IT resources, thus attracting the attention of IT managers.
However, some IT managers and security researchers have warned enterprises that the technical problems presented after virtualization will make their systems more vulnerable to hacker attacks.
Chad Lorenz C, a technical
Before a disaster arrives, we can make a lot of preparations to avoid the disaster, but we can't help but think about what we should do if the disaster really strikes? For system reinforcement, we also need to be fully prepared.
Highlights of "security"
1. Try to install the English version of the operating system
If you only want to improve the
Because UNIX systems often undertake key tasks, they are often the first choice for intruders to attack. Therefore, intrusion detection and system security protection are one of the most important tasks of administrators. So, without the help of other tools, how can we determine the current security of the system? How
Linux system security and optimization configuration 1. openssh security configuration this section focuses on SSH-related security configuration 1. 1. prohibit the root user from logging on only to normal users, and then switch to the root user using the su command. How to restrict the su command PermitRootLoginno1.2.
1. InstallationYum Install tcpdump-y2. Monitoring Packetstcpdump-i eth0--Monitor the ETH0 network card of this machine tcpdump host 192.168.1.120 and \ (192.168.1.121 or 192.168.1.122\)--intercepts multiple IP packetstcpdump-i eth0 DST host 192.168.1.120--monitors all packets sent to the host to the machine3. Monitoring the port of the hosttcpdump TCP Port 22--monitors the TCP22 port of this machinetcpdump UDP port 123--Listen for udp123 ports on this machine4. Parameters C:Tcpdump will exit aft
First, physical protection1) Modify the Grub passwordApplicable environment: own office, not suitable for the managed Netcom computer room#grub-md5-crypt generate an encrypted passwordThen in the/etc/grub.conf file,Title CentOS (2.6.10-???)Add 2 rows to the next linePassword--md5 a normal password.Lock2) Use Vlock Lock terminal (temporary lock)#yum-y Install VlockInput Vlock can lock the terminal3) To raise awareness of prevention, prevent internal staff, avoid the cost of hard disk, waste paper
print timestamps in each line of output-TT does not format the time per row of output (NT: This format may not see its meaning at one glance, such as a timestamp printed as 1261798315)-TTT tcpdump output, a period of time (in milliseconds) is delayed between each two lines of printing-TTTT printing of a date before the timestamp of each row is printed-V generates detailed output when parsing and printingDST host host if the destination domain of the IPV4/V6 packet is host, the corresponding con
1. run the "Regedit" command to start the Registry Editor, configure security items in the Windows registry (1), disable the Windows Remote Registry Service, and run the "Start-> Run" command in the taskbar ", enter Regedit to enter the Registry Editor. Locate the "RemoteRegistry" item under HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services in the registry .) Right-click "RemoteRegistry" and select
Abstract: The Access Control Model for traditional UNIX systems is very simple-for common users, Super Users. In this model, a process or account has either very small permissions or all system permissions. Obviously, this is of no benefit to system security. Starting from the Linux-2.1 kernel, the concept of capacity is introduced to achieve more fine-grained ac
I. Web Server Security
PHP is actually a module function of the Web server. Therefore, you must first ensure the security of the Web server. Of course, to ensure the security of Web servers, you must first ensure the system security. This is a long way to go and is endless.
Unix SystemIn, some programs use the systemRootProcess running. These programs do not always have suid permission, because many of them only run by the root, the system administrator needs to know what these programs are doing and what other programs these programs will run.
(1) Start the system
When some unix systems (such as sco unix/xenix) are started, they are run in a way called a single user. In this
Improve ext3 File System Security with chattr
This article describes in detail how to use this feature to protect the security of the EXT3 file system.
1. What is the attribute of ext3)
Starting from the Linux 1.1 series kernel, The ext2 file system supports additional tags
How to prevent an attacker from illegally stealing important information from an FTP server, and how to prevent an attacker from using an FTP server to spread trojans and viruses. These are issues that the system administrator needs to focus on. This time I'm going to talk about how to improve the security of the FTP server, as an example of the broadest vsftp used on Linux operating
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.