Linux Security

4K

Solutions

4

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Related Topics

  1. Linux
  2. Linux Networking
  3. Linux Distributions
  4. Security
  5. Software Firewalls
  6. Linux OS Dev
  7. Apache Web Server
  8. OS Security
  9. Unix OS
  10. SSH / Telnet Software
Refine results

Hi,
I hope someone can help me with this.

I have received a computer and a robotic machine (PC that connects to a Robotic machine through a cross over cable).
Currently, I have 2 issues:

1. I …

589 views
Windows Server 2016: All you need to know
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Hello,

I'm using Alienvault Ossim v. 5.3.79 together with ossec v. 2.8.

I'm trying to extend the following rules:
1002 - Unknown error somewhere in the system - bad words;
1003 - Non standard …

239 views

Hi All,

Getting the above following message in my auth.log on my server from the above ip and many others ... what does this mean?

J

973 views

Dear Colleagues,

I have a problem with executing SU command in Ubuntu 16.04.02. LTS.
The output is « -bash: /bin/su: Permission denied » (see attached screenshot).

Plz suggest something to …

7118 views

I want firefox to not erase cookies on browser close. I want to set this via a script. Below are gui based instructions for the goal settings.

Anyone know how to do this?

Thanks!

Firefox

166 views

It is some type of Linux honey pot program. I was given a fife, honeymine.py, that is supposed to set the program up to to end to a SIEM to gather information on my internal network. Supposed to be …

3112 views

What is the easiest way to do this , do you have a sample kickstart file you can share with me that would have these options

thanks!!!!!!!!

1109 views

What is 'sticky session' when considering web traffic load balancing and how session-stickiness is usually achieved ?

can you please explain me a real world scenario. Like how it is used.

258 views

hi all,

I am now learning basic operation of Lunix and unix:

1) how to list active process in linux and unix and kill it accordingly.
2) how to change application start mode so that we can …

21150 views

Hi,
i'm looking for the quickest way to query Windows Event ID's from a Linux CentOS device.
I managed to do it via WMI but the enumerations of security logs using WMI simply takes too long.
what …

397 views
What is SQL Server and how does it work?
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

I am trying to set up a linux box as router ( packet forwarder to external + NAT). All the references I have found show that can be achieved using  iptables.
The question I have , if for performance …

381 views

I have Included the script.  This is a new install but the access_log is real and has values in it.  This script works on another instance without any problems.  The script reads the access log and …

6115 views

Hi,

I want ot learn and practive Linux commands on my windows 10 laptop. how to instal and set up and practice in centos. please advise
I was checking below but not sure where and how to get …

65226 views

Hi there
We are an MSP and cloud host. We would like to buy (or use) a web filter that we can provision in the cloud and offer to our clients to use it as a web proxy (if that’s the best way, …

7228 views

Hi,

I am trying to set up a openLDAP (2.44) search/auth-proxy to a Windows 2012 R2 AD server on and off for a month now with no apperent success.

Third party applications need to search (verify)…

37256 views

Hello guys,
well i wanted to clear root password and admin password (sudo user) , using passwd -l root and then passwd -l admin, the result was successful
well my question how i can reset the …

796 views

Fine Tune your automatic Updates for Ubuntu / Debian

0203 views

I have a python script that copies some proprietary code from a USB to an app folder on a debian wheezy system.  The usb will be sent to a client site for them to plugin and click a button to do the …

5110 views

Hi, I am running mail sever on a CentOS 7 Linux, the default permission of /var/log/maillog is not worldwide readable, I want to make it readable to others.

In the rsyslog.conf, I added the …

2148 views
Free learning courses: Active Directory Deep Dive
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Keep getting this error every time I add a password to a user.

(CODE)

297 views

Hi guys.

We are building a certain system where the user register to the website and the same user has to be created on the OS level
The web registration form automatically hashes the password …

17132 views

What´s the diference ? can I use liboauth-php instead oauth-1.2.3 ?
the liboauth is installed, but not working ?
I´m using Debian Wheezy.

3122 views

Centos 7.  user no longer able to access home dir.   Secure log shows fatal: bad ownership or modes for chroot directory "/home/username" [postauth].  Root owns /home, user owns /home/username.  …

6425 views

i have set some rules in ip tables as example i added

(CODE)

and thats how my iptables looks like

(CODE)


but there is always ips by-pass the limit and they go up to 400 connection per …

2298 views

Please tell me what this error means?  

(CODE) - this is the complete error

I have mod_security in httpd.conf commented out.  

(CODE)

Ultimately, I want it disabled.  So is there a better …

2126 views
Show more content
201506-LO-Top-001

Linux Security

4K

Solutions

4

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Related Topics

  1. Linux
  2. Linux Networking
  3. Linux Distributions
  4. Security
  5. Software Firewalls
  6. Linux OS Dev
Top Experts In
Linux Security
<
Monthly
>