Linux system security best practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Assessing criticality levels in the data center

    Not all downtime has the same impact on business performance. Facilities experts Jerry Burkhardt and Richard W. Dennis provide a model on how to assess the Criticality Levels of your data center. 

  • BackTrack: The gotta-have free security tool you've never heard of

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. 

  • Account locking for Linux via PAM

    Discover how to configure account blocking on a Red Hat host with PAM and prevent a potential denial-of-service attack caused by repeated locking of user accounts. 

  • Seven tips for optimizing shell script security

    Inherent weaknesses, a complex syntax and the general lack of consideration for security make writing secure shell scripts difficult. This tip focuses on major issues in shell script security across multiple shells. 

  • Understanding logging, log monitoring in 'Hardening Linux'

    In Chapter 5, "Understanding Logging and Monitoring," Turnbull compares the syslog daemon to its more powerful and more secure successor, syslog-NG. He also shows readers the Simple Event Correlation tool for highlighting events in logs. 

  • Chapter 1, Secure installation and configuration, of 'Hardening Apache'

    Chapter 1, Secure Installation and Configuration, 'Hardening Apache' walks users through the basics of encryption and configuring Apache 1.3x and 2.x with Secure Sockets Layer. 

  • Altering security attributes under SELinux

    Security expert James Turnbull explains where to find the policy files for Red Hat's SELinux if you want to alter the attribues of an object. 

  • DAC and MAC safety

    Security expert James Turnbull describes the difference between discretionary access control and mandatory access control and which is safer. 

  • Removing Web access from Firefox

    Security expert James Turnbull recommends Web resources describing how to access the HTML functionality of Web browsers without allowing Web access. 

  • Security checklists and audits

    Security expert James Turnbull provides a link for a security checklist when performing an audit.