Linux system security best practices

Email Alerts

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security has its privileges

    Maybe an innocent bystander can be excused for not seeing and stopping a crime about to happen, but IT security administrators can't. They need to keep their eyes open, according to Gijo Mathew, a security strategist for Computer Associates Internati... 

  • Management central to securing Linux

    After performing more security assessments than he can count, Gijo Mathew has seen every worst practice imaginable. He's even seen an IT shop replace virus-violated data with an unpatched backup that succumbed to the same virus. A security strategist... 

  • How to be a 'security warrior,' part 2

    No soldier goes into battle without training. But once he's in the trenches, he sometimes has to rely on skills he didn't learn in boot camp. The same goes for today's security admins, many of whom are new to Linux or even security administration.

  • How to be a 'security warrior,' part 1

    In computer warfare, security admins must go into battle riding on a strong vehicle and armed with effective tools, according to security expert Anton Chuvakin. Fortunately, the security warrior who's protecting Linux has both.

    Chuvakin's securit... 

  • Commentary: Addition of IPsec locks down 2.6 kernel

    SearchEnterpriseLinux.com expert adviser Kenneth Milberg comments on the security upgrades in the 2.6 Linux kernel, in particular the addition of IPsec. 

  • Red Hat repairs buffer overflows in Ethereal

    Two buffer overflow vulnerabilities have been repaired in open-source network monitoring software Ethereal. 

  • Don't be a spam patsy

    How to prevent spammers from using forged e-mail addresses. 

  • Security policy and the law

    A look at how security policy and the law should fit together and some links to legal resources. 

  • Linux security learning guide

    Here's a collection of resources to get you up to speed on Linux security. 

  • Dos & Don'ts: Securing e-mail systems

    Want to keep your e-mail systems safe from hacker attacks and spam? Here are a few tips from Stalker Software president and CEO Vladimir Butenko.