Linux system security best practices News
July 15, 2008
A Linux security expert outlines best practices, from granting admins the least system access possible to the importance of system audits and when to turn on listening daemons.
November 06, 2007
Red Hat has announced that Red Hat Enterprise Linux 5 (RHEL 5) will now be subject to the Common Criteria certification and HP will offer multilevel security services for RHEL 5.
June 05, 2007
Told to keep SELinux turned on everywhere, all the time, many IT managers have to break a long established habit of turning it off. But, it should stay on, according to Red Hat's Dan Walsh, who says it's the only way to ensure 100% protection in the...
May 03, 2007
In the column that follows, author and SELinux expert Frank Mayer will walk you through five of the ways that this venerable Linux security technology may surprise you.
Linux system security best practices Get Started
Bring yourself up to speed with our introductory content
TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Linux system security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This handy guide to SELinux presents the best tips and advice on getting started with the Linux kernel security tool – from configuration to managing policies and access control. Continue Reading
Start hardening your Linux servers with this guide to essential tools and applications for Linux security, including SELinux, Nagios, firewalls and more. Continue Reading
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Continue Reading
Manage Linux system security best practices
Learn to apply best practices and optimize your operations.
'Secure' is a relative term when talking SSH remote access to servers. Keep your Linux servers under lock and key with these simple sshd tweaks. Continue Reading
Signing Linux RPM packages assures users of the package that the RPM has not been tampered with. Learn how to create a Gnu Privacy Guard key and sign your RPM packages. Continue Reading
Learn how to install the MySQL database securely with these essential steps and guidance. Assess your security risk level, prevent attacks and monitor your system effectively with this tip. Continue Reading
Problem Solve Linux system security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Unlike permissions, Linux attributes apply to all users, even root. With Linux extended attributes, administrators can increase file security. Continue Reading
Here's how to solve the problems when trying to access files via a virtual machine in SELinux. Continue Reading
When setting up Red Hat Enterprise Linux on your data center servers, you need to make security decisions. Learn about security options for RHEL including SELinux, iptables firewall, TCP Wrapper and application security use considerations. Continue Reading