Linux system security best practices

Email Alerts

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BackTrack: The gotta-have free security tool you've never heard of

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. 

  • Account locking for Linux via PAM

    Discover how to configure account blocking on a Red Hat host with PAM and prevent a potential denial-of-service attack caused by repeated locking of user accounts. 

  • Seven tips for optimizing shell script security

    Inherent weaknesses, a complex syntax and the general lack of consideration for security make writing secure shell scripts difficult. This tip focuses on major issues in shell script security across multiple shells. 

  • Chapter 1, Secure installation and configuration, of 'Hardening Apache'

    Chapter 1, Secure Installation and Configuration, 'Hardening Apache' walks users through the basics of encryption and configuring Apache 1.3x and 2.x with Secure Sockets Layer. 

  • Understanding logging, log monitoring in 'Hardening Linux'

    In Chapter 5, "Understanding Logging and Monitoring," Turnbull compares the syslog daemon to its more powerful and more secure successor, syslog-NG. He also shows readers the Simple Event Correlation tool for highlighting events in logs. 

  • Altering security attributes under SELinux

    Security expert James Turnbull explains where to find the policy files for Red Hat's SELinux if you want to alter the attribues of an object. 

  • DAC and MAC safety

    Security expert James Turnbull describes the difference between discretionary access control and mandatory access control and which is safer. 

  • Removing Web access from Firefox

    Security expert James Turnbull recommends Web resources describing how to access the HTML functionality of Web browsers without allowing Web access. 

  • Security checklists and audits

    Security expert James Turnbull provides a link for a security checklist when performing an audit. 

  • The Linux desktop: Browser and distro security tips

    Don't be fooled. Firefox is no more secure than Opera or Internet Explorer, says security expert James Turnbull. The author of "Hardening Linux" explains why distro security can be subjective, what basic steps users can take to protect themselves fr...