Linux Security

4K

Solutions

4

Articles & Videos

4K

Contributors

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

Refine results

Hi,
i'm looking for the quickest way to query Windows Event ID's from a Linux CentOS device.
I managed to do it via WMI but the enumerations of security logs using WMI simply takes too long.
what …

331 views
Ransomware-A Revenue Bonanza for Service Providers
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

I am trying to set up a linux box as router ( packet forwarder to external + NAT). All the references I have found show that can be achieved using  iptables.
The question I have , if for performance …

321 views

I have Included the script.  This is a new install but the access_log is real and has values in it.  This script works on another instance without any problems.  The script reads the access log and …

653 views

Hi,

I want ot learn and practive Linux commands on my windows 10 laptop. how to instal and set up and practice in centos. please advise
I was checking below but not sure where and how to get …

65126 views

Hi there
We are an MSP and cloud host. We would like to buy (or use) a web filter that we can provision in the cloud and offer to our clients to use it as a web proxy (if that’s the best way, …

760 views

Hi,

I am trying to set up a openLDAP (2.44) search/auth-proxy to a Windows 2012 R2 AD server on and off for a month now with no apperent success.

Third party applications need to search (verify)…

37140 views

Hello guys,
well i wanted to clear root password and admin password (sudo user) , using passwd -l root and then passwd -l admin, the result was successful
well my question how i can reset the …

743 views

Fine Tune your automatic Updates for Ubuntu / Debian

067 views

I have a python script that copies some proprietary code from a USB to an app folder on a debian wheezy system.  The usb will be sent to a client site for them to plugin and click a button to do the …

547 views

Hi, I am running mail sever on a CentOS 7 Linux, the default permission of /var/log/maillog is not worldwide readable, I want to make it readable to others.

In the rsyslog.conf, I added the …

263 views
What is SQL Server and how does it work?
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Keep getting this error every time I add a password to a user.

(CODE)

242 views

Hi guys.

We are building a certain system where the user register to the website and the same user has to be created on the OS level
The web registration form automatically hashes the password …

1785 views

What´s the diference ? can I use liboauth-php instead oauth-1.2.3 ?
the liboauth is installed, but not working ?
I´m using Debian Wheezy.

368 views

Centos 7.  user no longer able to access home dir.   Secure log shows fatal: bad ownership or modes for chroot directory "/home/username" [postauth].  Root owns /home, user owns /home/username.  …

6110 views

i have set some rules in ip tables as example i added

(CODE)

and thats how my iptables looks like

(CODE)


but there is always ips by-pass the limit and they go up to 400 connection per …

2140 views

Please tell me what this error means?  

(CODE) - this is the complete error

I have mod_security in httpd.conf commented out.  

(CODE)

Ultimately, I want it disabled.  So is there a better …

264 views

We have a Debian 7 server on which Virtualmin-Webmin is installed for serving virtual servers.
Spam emails are being sent continuously and we cannot find out how.

There is NO email set on the …

10140 views

Hi all -
I have sites where I force HTTP -> HTTPS using this code in HTACCESS:
   RewriteEngine On
   RewriteCond %{SERVER_PORT} 80
   RewriteRule ^(.*)$ https://example.com/$1 [R,L]      
NOW I have…

9129 views

The version of Linux Ubuntu is:-

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016

After …

16161 views
Master Your Team's Linux and Cloud Stack!
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

This is the version of Linux Ubuntu 14.04.03

Linux version 4.4.0-38-generic (buildd@lgw01-22) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #57~14.04.1-Ubuntu SMP Tue Sep 6 17:20:43 UTC 2016…

26113 views

Hi all,

I want to find a software run on Linux can count people from camera (support RTSP, HTTP) or from file video.
I used to use https://zoneminder.com (No support count people) and …

2158 views

Dear Experts,

I'm involved in a rather big project and I'm trying to automate as much of it as possible.
The problem I'm tackling right now consists of the following.
Assume I have a web …

595 views

Hello!

I'm not sure if it's a problem to begin with, but the situation is that run Postfix as a mail server on my computer. Almost a year ago because of numerous failed login attempts I installed …

4119 views

We have an project where we need to protect the rights of digital media that will form part of a workflow. Looking for some advice on how best to tackle this.

What we want to do is build Linux VM's…

13105 views

I want to create a service account that can connect to a Linux operating system and read the following:

- Users' permissions (Read, Write, etc.) to certain directories - not just for the service …

13131 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Linux
    (64,642)
  2. Linux Networking
    (17,931)
  3. Linux Distributions
    (26,896)
  4. Security
    (23,345)
  5. Software Firewalls
    (19,721)
  6. Linux OS Dev
    (8,814)
  7. Apache Web Server
    (19,641)
  8. OS Security
    (21,511)
  9. SSH / Telnet Software
    (2,175)
  10. Unix OS
    (32,732)