Linux Security

4K

Solutions

3

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Refine results

We have an project where we need to protect the rights of digital media that will form part of a workflow. Looking for some advice on how best to tackle this.

What we want to do is build Linux VM's…

1325 views
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

I want to create a service account that can connect to a Linux operating system and read the following:

- Users' permissions (Read, Write, etc.) to certain directories - not just for the service ac…

1341 views

Hello,

I've been a Windows user all my life and using Linux just in VM's, but I'm crossing over to the penguin side and installing Linux as my main OS on my laptop (a specific Debian distro)   :)

345 views

I use ipset on our Centos 6 server.  I need to back up what I have in the ipset.

I have tried this  command - (CODE)

I am logged in as root why am I getting permission denied?

Here is my scri…

934 views

Hello Dears,

I want to configure my Linux Servers (Most of them are Ubuntu servers) in such a way that an LDAP account is used to login into the servers in order to administer them. My objective is…

445 views

I have an old RHEL 5.11 with IP tables version 1.3.5 and I am looking at the output chain and this is what I see




what does this mean ? it is blocking all output or allowing all output ??

t…

230 views

So I have a pretty simple situation that apparently is very complex all because my production server has to be Red Hat six because of the software we use.  And apparently until Red Hat seven you could…

151 views

I am curious to look for culprit who and how made changes in my passwd and shadow file under path /etc and i got my root id corrupted /renamed.

somehow i got it recovered..but now need to check for…

1369 views

Although I raised other questions for same topic ..but no satisfactory answer as of now

This query is only for ESXI 4.1..as normal local user or domain user [Member of ESX Admins Group of AD Domain…

566 views

Need to confirm if we can change UID in ESX 3.5 or Esxi 4.x/5.x

and what should be the default UID for  multiple users in Host.

is this related to access type given for diff user?

6130 views
 Java Android Coding Bundle

Whether you're an Apple user or Android addict, learning to code for the Android platform is an extremely valuable, in-demand skill. It all starts with Java, the language behind the apps and games that make Android the top platform it is today.

UNIX ID Management/Administration is one of the most tedious job since we have to login interactively to each of the server when there is a request to create/delete a sysadmin (or apps support) user i…

648 views

I am new to Linux world and have a job of administering few Oracle Linux servers. I discovered that few of them are 7.0, few 7.1 and few 7.2.  I do not know how updates correctly works on Linux world,…

538 views

I recently moved from Windows Server administration to Linux administration. In Windows I get used to practice that all critical and security updates are installed ASAP on their release. On Windows th…

545 views

I have a CentOS 4/5/6 (32-bit) Linux box, my emails with pdf are getting quarantined everytime.

is there any way I can run any command to put in some safe list or remove from quarantine for ever

4177 views

Hi

I am running CentOS and several times see "SASL LOGIN authentication failed: authentication failure". Seems someone is trying to logon to my mail server illegally.

I have installed fail2ban t…

140 views

software suggestions to monitor and log EVERY file access on redhat/linux.

460 views

How hard is it to change an existing RHEL system to have luks full disk encryption? Is it a big ordeal?

191 views

[root@puppetmaster rules.d]# service network restart
Shutting down interface eth0:                              [  OK  ]
Shutting down loopback interface:                          [  OK  ]
Bringing…

543 views

Q1:
Anyone can point me to such a standard / guide?
In particular those used by Wincor Nixdorf or IBM or NCR (anyone of them).

Q2:
Are these ATMs running on custom Linux or custom Windows or pro…

4111 views
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

I initially set up my main IPA server on one of my Red Hat servers.  But it's one of our production servers and I have heard that it is best for your IPA servers to be dedicated for IPA.  So I am plan…

355 views

I am having issues connecting to my Oracle database from the web server. I used nmap  from the Oracle server to identify the state of port 1521.   If I run nmap on port 1521 using the IP address of th…

1350 views

Hi,

We are bringing on an extra pair of hands to work on our systems.

We have a Ubuntu server - I have root access and I wish to grant the new employee access via SSH also.

Is there anyway to…

990 views

A proprietary app requires that the folder must have group permission
group:rwx

As this is an audit gap, can we circumvent with ACL (think starting Solaris 9
we have this) & to do so?

If the app wri…

978 views

IPA complaining about DNS but DNS looks good....

(CODE)

267 views

I have seen this article

 - http://www.freeipa.org/page/Howto/Integrating_a_Samba_File_Server_With_IPA

But that method only seems to work in Red Hat 7.  How can I get IPA and samba working toget…

158 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Linux
    (64,149)
  2. Linux Networking
    (17,871)
  3. Linux Distributions
    (26,812)
  4. Security
    (22,635)
  5. Software Firewalls
    (19,675)
  6. Linux OS Dev
    (8,785)
  7. Apache Web Server
    (19,561)
  8. OS Security
    (21,408)
  9. SSH / Telnet Software
    (2,129)
  10. Unix OS
    (32,624)