Linux security tools

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security and tools in Linux distributions

    An expert recommends specific security features when looking at a Linux distribution. 

  • AppArmor vs. SELinux

    An expert says that, yes, AppArmor does offer equivalent security to SELinux. 

  • Bastille Linux: Introduction and installation

    Bastille Linux is an automated security tool, ideal for cross-platform environments. Get started here with an introduction and instructions for installation. 

  • Endpoint policy management tools

    A security expert recommends cfengine and Puppet as two open source endpoint policy management tools, along with cautionary advice on their usage. 

  • SUSE security: Forgotten passwords, AppArmor

    A security expert describes how to harden your openSUSE 10.2 installation and talks about open source security tools. 

  • Open source security tools

    Security expert James Turnbull gives an example of how open source security tools can be used to create intricate security setups. 

  • Built-in mechanisms for securing the kernel

    Security expert James Turnbull sugguests OpenWall and LIDS as two examples of built-in mechanisms that can help to further secure the Linux kernel. 

  • Creating your own CA for SSL encryption

    Security expert James Turnbull recommends Web resources for IT experts interested in creating their own CAs. 

  • How to smack IT intruders with MACs

    Give the boot to unauthorized users with this how-to on mandatory access controls (MACs). Find out how to use MACs to establish security levels, create secure hash keys and control underlying binary code. 

  • IPsec architectures and implementation methods

    In this excerpt of The TCP/IP Guide, author Charles M. Kozierok explains the three different implementation architectures defined for IPsec: integrated, bump in the stack (BITS) and bump in the wire (WITW).