Linux security risks and threats

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Compiling OpenSSH on Feisty Fawn

    An Ubuntu expert describes where in the process of compiling OpenSSH on Feisty Fawn a reader missed a step. 

  • Setting up SSH for remote, secure server access

    A Linux security expert gives non-operating system specific advice on setting up Secure Shell (SSH) for remote access from a server. 

  • SquidGuard as Linux proxy for Windows XP

    A Linux security expert recommends a helpful SquidGuard tutorial for a user having trouble running redirec_program /usr/bin/squidGuard. 

  • Securing Fedora Core 5 against attackers

    A Linux security expert recommends several best practices for hardening your Fedora Core 5 proxy server. 

  • Alert vs. log in the Snort /var/log/snort directory

    A Linux security expert explains that the difference between the Snort alert and log logs in the Snort /var/log/snort directory is based on how rules are written. 

  • Running Nagios on RHEL 5 or Solaris 10

    A security expert recommends using a Linux-based operating system, like Red Hat, with open source network monitoring tool Nagios. 

  • Reporting Nagios data to BMC Patrol

    A security expert describes how to configure open source network monitoring tool Nagios so that data alerts, reports and other information generated are sent to BMC Patrol, which will be used as an alert tool. 

  • Monitoring open ports on RHEL 5

    A Linux security expert describes how to determine which ports are open in Red Hat Enterprise Linux 5 (RHEL 5) and how to figure out if your ports have been compromised by an attack. 

  • Scanning a compromised Fedora server

    Security expert James Turnbull explains how to determine if your server has been compromised and recommends some scanning tools. 

  • Locking down open relays

    A security expert recommends two tools to determine if your mail server is an open relay and has been compromised.