Linux security risks and threats

Email Alerts

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • SquidGuard as Linux proxy for Windows XP

    A Linux security expert recommends a helpful SquidGuard tutorial for a user having trouble running redirec_program /usr/bin/squidGuard. 

  • Linux security help: Nagios with BMC Patrol, setting up SSH and more

    A Linux security expert describes how to configure Nagios with BMC Patrol, gives non-platform-specific help for setting up Secure Shell (SSH) and more in this interview. 

  • Securing Fedora Core 5 against attackers

    A Linux security expert recommends several best practices for hardening your Fedora Core 5 proxy server. 

  • Alert vs. log in the Snort /var/log/snort directory

    A Linux security expert explains that the difference between the Snort alert and log logs in the Snort /var/log/snort directory is based on how rules are written. 

  • Running Nagios on RHEL 5 or Solaris 10

    A security expert recommends using a Linux-based operating system, like Red Hat, with open source network monitoring tool Nagios. 

  • Reporting Nagios data to BMC Patrol

    A security expert describes how to configure open source network monitoring tool Nagios so that data alerts, reports and other information generated are sent to BMC Patrol, which will be used as an alert tool. 

  • Monitoring open ports on RHEL 5

    A Linux security expert describes how to determine which ports are open in Red Hat Enterprise Linux 5 (RHEL 5) and how to figure out if your ports have been compromised by an attack. 

  • Compiling OpenSSH on Ubuntu 7.04 Feisty Fawn Server

    Find out how to compile OpenSSH on the latest version of Ubuntu, Ubuntu 7.04 Feisty Fawn Server, to get safely connected to your remote servers. 

  • Security information management: OSSIM

    Get an enterprise-wide view of the state of security with OSSIM, Open Source Security Information Management, a monitoring package of integrated open source tools. 

  • Improving Snort performance with Barnyard

    Increasing the speed and efficiency of intrusion-detection system application Snort means reduced false positives and more focus on actual threats. You can do this with Barnyard, a third-party application that leaves Snort with more capacity to scan/...