Linux Learn Tips and Tricks - Page 16
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
This book addresses unanswered questions about Linux security and optimization in the marketplace. It is intended for a technical audience and discusses how to install a Red Hat Linux Server with all the necessary security and optimization for a high
This is the World Wide Web Security Frequently Asked Question list (FAQ). It attempts to answer some of the most frequently asked questions relating to the security implications of running a Web server and using Web browsers.
This document describes the process of securing and hardening the default Debian installation. In addition this document just gives a overview of what you can do to increase the security of your Debian GNU/Linux installation. Many parts of this HOWTO
Log files are the central place to find information about problematic system errors.
AIDE, Advanced Intrusion Detection Environment, is a file integrity checker, a type of intrusion detection program.
Reducing the risk of intrusion can be achieved by eliminating many of the known common problems.
Tripwire is a program that monitors file integrity by maintainig a database of cryptographic signature for programs.
The first step to an attack is to see what services a server is running, which is done with a port scan of the server.
The best way to be protected from buffer overflows is to not have them in the code that is run
Telnet is a popular way to access a remote system, unfortunately, it is incredibly insecure.
Several independant kernel patches exist to increase the security in your kernel