Linux security News
July 26, 2007
While various authentication options are available for managing Linux servers in a heterogeneous IT environment, is Microsoft Active Directory the best one?
Manage Linux security
Learn to apply best practices and optimize your operations.
This chapter from Linux Networking Cookbook helps administrators manage remote networks securely with OpenSSH. Learn about authentication, encryption, and data transfers. Continue Reading
This tip explains how to install and monitor a secure PostgreSQL database server and some of your primary infrastructural considerations, such as a secure network design. Continue Reading
With this three-step approach, securely install Red Hat Enterprise Linux 5.1, bypass more complex security and avoid the ill-advised "install all" approach, advises an expert. Continue Reading
Problem Solve Linux security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SUSE Linux Enterprise Server offers a Rescue CD for repairing the system if your hardware causes a crash at reboot. This tip shows you how to use it. Continue Reading
Solaris 10 Trusted Extensions and SELinux are best suited to different system requirements and administrator skill sets. Our security expert explains the distinction and recommends when to implement each. Continue Reading
Establishing an independent certificate authority with OpenSSL enables you to create public key certificates and to verify that these public keys are authentic and that email messages are secure. Continue Reading