Linux system security best practices
- July 15, 2008
A Linux security expert outlines best practices, from granting admins the least system access possible to the importance of system audits and when to turn on listening daemons.
- November 06, 2007
Red Hat has announced that Red Hat Enterprise Linux 5 (RHEL 5) will now be subject to the Common Criteria certification and HP will offer multilevel security services for RHEL 5.
- June 05, 2007
Told to keep SELinux turned on everywhere, all the time, many IT managers have to break a long established habit of turning it off. But, it should stay on, according to Red Hat's Dan Walsh, who says it's the only way to ensure 100% protection in the...
- May 03, 2007
In the column that follows, author and SELinux expert Frank Mayer will walk you through five of the ways that this venerable Linux security technology may surprise you.
- October 31, 2006
IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.
- October 16, 2006
The reason SELinux is complex is because Linux is a full-featured OS that requires it, said one expert. The next version of Red Hat Linux aims to simplify things with out-of-the-box policy modules that can ship with an application.
- October 09, 2006
For one-tenth the cost of systems management software from Hewlett-Packard and the like, IT managers chose an outsourced solution based on the open source Nagios stack.
- October 09, 2006
- August 17, 2006
In the upcoming Red Hat Enterprise Linux 5 server distribution, Red Hat Directory Server will be more than a switchboard of IT information. Added identity management features will build up security while easing administration hassles, says Red Hat ...
- July 26, 2006
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose.
- July 18, 2006
Microsoft has pulled the Windows add-on Private Folder 1.0 after enterprise customers questioned the logic of letting individual employees encrypt their own data.
- June 15, 2006
IT shops using HP or BMC monitoring tools might want to take Nagios for a test-drive. "Pro Nagios 2.0" author James Turnbull explains why.
- June 05, 2006
In the post-9/11 world, security measures have been tightened, especially in the import/export industry. Learn how one firm used Linux and hardware virtualization to keep up with changing rules and add flexibility to client IT environments.
- May 02, 2006
Using PGP and GPG for e-mail encryption, decryption and digital signatures can give you the keys to digital security and keep your IT shop safe from spoofing and hacking.
- April 19, 2006
IT managers often fret about security when choosing between proprietary and open source solutions, but experts say not to worry. In many cases open source actually provides greater security. Writer Andrew Bardin Williams explains the benefits of ...