New & Notable
Linux system security best practices News
July 15, 2008
A Linux security expert outlines best practices, from granting admins the least system access possible to the importance of system audits and when to turn on listening daemons.
November 06, 2007
Red Hat has announced that Red Hat Enterprise Linux 5 (RHEL 5) will now be subject to the Common Criteria certification and HP will offer multilevel security services for RHEL 5.
June 05, 2007
Told to keep SELinux turned on everywhere, all the time, many IT managers have to break a long established habit of turning it off. But, it should stay on, according to Red Hat's Dan Walsh, who says it's the only way to ensure 100% protection in the...
May 03, 2007
In the column that follows, author and SELinux expert Frank Mayer will walk you through five of the ways that this venerable Linux security technology may surprise you.
Linux system security best practices Get Started
Bring yourself up to speed with our introductory content
TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable ... Continue Reading
Evaluate Linux system security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This handy guide to SELinux presents the best tips and advice on getting started with the Linux kernel security tool – from configuration to managing policies and access control. Continue Reading
Start hardening your Linux servers with this guide to essential tools and applications for Linux security, including SELinux, Nagios, firewalls and more. Continue Reading
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Linux system security best practices
Learn to apply best practices and optimize your operations.
'Secure' is a relative term when talking SSH remote access to servers. Keep your Linux servers under lock and key with these simple sshd tweaks. Continue Reading
Signing Linux RPM packages assures users of the package that the RPM has not been tampered with. Learn how to create a Gnu Privacy Guard key and sign your RPM packages. Continue Reading
Learn how to install the MySQL database securely with these essential steps and guidance. Assess your security risk level, prevent attacks and monitor your system effectively with this tip. Continue Reading
Problem Solve Linux system security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Unlike permissions, Linux attributes apply to all users, even root. With Linux extended attributes, administrators can increase file security. Continue Reading
Here's how to solve the problems when trying to access files via a virtual machine in SELinux. Continue Reading
When setting up Red Hat Enterprise Linux on your data center servers, you need to make security decisions. Learn about security options for RHEL including SELinux, iptables firewall, TCP Wrapper and application security use considerations. Continue Reading