Linux Security

4K

Solutions

4

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Related Topics

  1. Linux
  2. Linux Networking
  3. Linux Distributions
  4. Security
  5. Software Firewalls
  6. Linux OS Dev
  7. Apache Web Server
  8. OS Security
  9. SSH / Telnet Software
  10. Unix OS
Refine results

What is 'sticky session' when considering web traffic load balancing and how session-stickiness is usually achieved ?

can you please explain me a real world scenario. Like how it is used.

218 views
VMware Disaster Recovery and Data Protection
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

hi all,

I am now learning basic operation of Lunix and unix:

1) how to list active process in linux and unix and kill it accordingly.
2) how to change application start mode so that we can …

2186 views

Hi,
i'm looking for the quickest way to query Windows Event ID's from a Linux CentOS device.
I managed to do it via WMI but the enumerations of security logs using WMI simply takes too long.
what …

351 views

I am trying to set up a linux box as router ( packet forwarder to external + NAT). All the references I have found show that can be achieved using  iptables.
The question I have , if for performance …

335 views

I have Included the script.  This is a new install but the access_log is real and has values in it.  This script works on another instance without any problems.  The script reads the access log and …

668 views

Hi,

I want ot learn and practive Linux commands on my windows 10 laptop. how to instal and set up and practice in centos. please advise
I was checking below but not sure where and how to get …

65155 views

Hi there
We are an MSP and cloud host. We would like to buy (or use) a web filter that we can provision in the cloud and offer to our clients to use it as a web proxy (if that’s the best way, …

7132 views

Hi,

I am trying to set up a openLDAP (2.44) search/auth-proxy to a Windows 2012 R2 AD server on and off for a month now with no apperent success.

Third party applications need to search (verify)…

37172 views

Hello guys,
well i wanted to clear root password and admin password (sudo user) , using passwd -l root and then passwd -l admin, the result was successful
well my question how i can reset the …

756 views

Fine Tune your automatic Updates for Ubuntu / Debian

098 views
NFR key for Veeam Backup for Microsoft Office 365
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

I have a python script that copies some proprietary code from a USB to an app folder on a debian wheezy system.  The usb will be sent to a client site for them to plugin and click a button to do the …

564 views

Hi, I am running mail sever on a CentOS 7 Linux, the default permission of /var/log/maillog is not worldwide readable, I want to make it readable to others.

In the rsyslog.conf, I added the …

288 views

Keep getting this error every time I add a password to a user.

(CODE)

259 views

Hi guys.

We are building a certain system where the user register to the website and the same user has to be created on the OS level
The web registration form automatically hashes the password …

1796 views

What´s the diference ? can I use liboauth-php instead oauth-1.2.3 ?
the liboauth is installed, but not working ?
I´m using Debian Wheezy.

379 views

Centos 7.  user no longer able to access home dir.   Secure log shows fatal: bad ownership or modes for chroot directory "/home/username" [postauth].  Root owns /home, user owns /home/username.  …

6184 views

i have set some rules in ip tables as example i added

(CODE)

and thats how my iptables looks like

(CODE)


but there is always ips by-pass the limit and they go up to 400 connection per …

2194 views

Please tell me what this error means?  

(CODE) - this is the complete error

I have mod_security in httpd.conf commented out.  

(CODE)

Ultimately, I want it disabled.  So is there a better …

280 views

We have a Debian 7 server on which Virtualmin-Webmin is installed for serving virtual servers.
Spam emails are being sent continuously and we cannot find out how.

There is NO email set on the …

10154 views
Master Your Team's Linux and Cloud Stack
Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Hi all -
I have sites where I force HTTP -> HTTPS using this code in HTACCESS:
   RewriteEngine On
   RewriteCond %{SERVER_PORT} 80
   RewriteRule ^(.*)$ https://example.com/$1 [R,L]      
NOW I have…

9149 views

The version of Linux Ubuntu is:-

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016

After …

16193 views

This is the version of Linux Ubuntu 14.04.03

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016…

26126 views

Hi all,

I want to find a software run on Linux can count people from camera (support RTSP, HTTP) or from file video.
I used to use https://zoneminder.com (No support count people) and …

2211 views

Dear Experts,

I'm involved in a rather big project and I'm trying to automate as much of it as possible.
The problem I'm tackling right now consists of the following.
Assume I have a web …

5112 views

Hello!

I'm not sure if it's a problem to begin with, but the situation is that run Postfix as a mail server on my computer. Almost a year ago because of numerous failed login attempts I installed …

4134 views
Show more content
201506-LO-Top-001

Linux Security

4K

Solutions

4

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Related Topics

  1. Linux
  2. Linux Networking
  3. Linux Distributions
  4. Security
  5. Software Firewalls
  6. Linux OS Dev
Top Experts In
Linux Security