Linux Security

4K

Solutions

3

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Refine results

What´s the diference ? can I use liboauth-php instead oauth-1.2.3 ?
the liboauth is installed, but not working ?
I´m using Debian Wheezy.

316 views
Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Centos 7.  user no longer able to access home dir.   Secure log shows fatal: bad ownership or modes for chroot directory "/home/username" [postauth].  Root owns /home, user owns /home/username.  Permi…

633 views

i have set some rules in ip tables as example i added

(CODE)

and thats how my iptables looks like

(CODE)


but there is always ips by-pass the limit and they go up to 400 connection per …

241 views

Please tell me what this error means?  

(CODE) - this is the complete error

I have mod_security in httpd.conf commented out.  

(CODE)

Ultimately, I want it disabled.  So is there a better …

215 views

We have a Debian 7 server on which Virtualmin-Webmin is installed for serving virtual servers.
Spam emails are being sent continuously and we cannot find out how.

There is NO email set on the ser…

1090 views

Hi all -
I have sites where I force HTTP -> HTTPS using this code in HTACCESS:
   RewriteEngine On
   RewriteCond %{SERVER_PORT} 80
   RewriteRule ^(.*)$ https://example.com/$1 [R,L]      
NOW I have…

956 views

The version of Linux Ubuntu is:-

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016

After bo…

1679 views

This is the version of Linux Ubuntu 14.04.03

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016…

2674 views

Hi all,

I want to find a software run on Linux can count people from camera (support RTSP, HTTP) or from file video.
I used to use https://zoneminder.com (No support count people) and https://kerb…

262 views

Dear Experts,

I'm involved in a rather big project and I'm trying to automate as much of it as possible.
The problem I'm tackling right now consists of the following.
Assume I have a web interfac…

541 views
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Hello!

I'm not sure if it's a problem to begin with, but the situation is that run Postfix as a mail server on my computer. Almost a year ago because of numerous failed login attempts I installed f…

468 views

We have an project where we need to protect the rights of digital media that will form part of a workflow. Looking for some advice on how best to tackle this.

What we want to do is build Linux VM's…

1368 views

I want to create a service account that can connect to a Linux operating system and read the following:

- Users' permissions (Read, Write, etc.) to certain directories - not just for the service ac…

1388 views

Hello,

I've been a Windows user all my life and using Linux just in VM's, but I'm crossing over to the penguin side and installing Linux as my main OS on my laptop (a specific Debian distro)   :)

380 views

I use ipset on our Centos 6 server.  I need to back up what I have in the ipset.

I have tried this  command - (CODE)

I am logged in as root why am I getting permission denied?

Here is my scri…

967 views

Hello Dears,

I want to configure my Linux Servers (Most of them are Ubuntu servers) in such a way that an LDAP account is used to login into the servers in order to administer them. My objective is…

481 views

I have an old RHEL 5.11 with IP tables version 1.3.5 and I am looking at the output chain and this is what I see




what does this mean ? it is blocking all output or allowing all output ??

t…

275 views

So I have a pretty simple situation that apparently is very complex all because my production server has to be Red Hat six because of the software we use.  And apparently until Red Hat seven you could…

190 views

I am curious to look for culprit who and how made changes in my passwd and shadow file under path /etc and i got my root id corrupted /renamed.

somehow i got it recovered..but now need to check for…

1395 views
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Although I raised other questions for same topic ..but no satisfactory answer as of now

This query is only for ESXI 4.1..as normal local user or domain user [Member of ESX Admins Group of AD Domain…

5102 views

Need to confirm if we can change UID in ESX 3.5 or Esxi 4.x/5.x

and what should be the default UID for  multiple users in Host.

is this related to access type given for diff user?

6187 views

UNIX ID Management/Administration is one of the most tedious job since we have to login interactively to each of the server when there is a request to create/delete a sysadmin (or apps support) user i…

686 views

I am new to Linux world and have a job of administering few Oracle Linux servers. I discovered that few of them are 7.0, few 7.1 and few 7.2.  I do not know how updates correctly works on Linux world,…

576 views

I recently moved from Windows Server administration to Linux administration. In Windows I get used to practice that all critical and security updates are installed ASAP on their release. On Windows th…

586 views

I have a CentOS 4/5/6 (32-bit) Linux box, my emails with pdf are getting quarantined everytime.

is there any way I can run any command to put in some safe list or remove from quarantine for ever

41113 views
Show more content
201506-LO-Top-001
Top Experts In
Linux Security
<
Monthly
>

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Linux
    (64,383)
  2. Linux Networking
    (17,897)
  3. Linux Distributions
    (26,854)
  4. Security
    (22,945)
  5. Software Firewalls
    (19,704)
  6. Linux OS Dev
    (8,799)
  7. Apache Web Server
    (19,600)
  8. OS Security
    (21,449)
  9. SSH / Telnet Software
    (2,150)
  10. Unix OS
    (32,684)