How to: Harden My Filesystem in Linux - Page 4
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Holistic Risk Management describes the impact of technology into the risk management world. More specifically it describes technologies effect on internal controls, process and policy in an organization when technology is introduced into areas such..
When this paper was first released, some readers confused this paper as a comparison between Windows and Linux. That is not the case. The purpose of this paper is to make you ask the question Why is no one hacking Linux anymore?
This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that canno
cryptlib is a powerful security toolkit that allows even inexperienced crypto programmers to easily add encryption and authentication services to their software.
For the *nix newbie who doesn't know the basics of securing his/her box.
A memo about defeating Denial of Service Attacks which employ IP source address spoofing.
Flask is an operating system security architecture that provides flexible support for security policies.
RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). All development is independent of governments and big companies, and
You will find security tips to improve your overall system security by the use of IPChains, IPTables, and TCP Wrappers. And you will learn some useful and subtle configuration options for Sendmail, Postfix, Bind, NFS and others.
linsec TWiki is a web-based collaboration tool for a personal project detailing security on Linux in particular, but any *NIX-ish operating system (ie. OpenBSD, Mac OS X, etc.).
Knocker is a simple and easy to use TCP security port scanner written in C to analyze hosts and all of the different services started on them.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords.
This is the main web site for flawfinder, a program that examines source code and reports possible security weaknesses (``flaws'') sorted by risk level. It's very useful for quickly finding and removing at least some potential security problems befor