Linux system security best practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Closing code won't save you

    Security expert James Turnbull explains why equating safety with hiding your source code is a fallacy. 

  • Blocking unauthorized IPs

    Security expert James Turnbull offers two ways for blocking unauthorized IPs. 

  • Passphrases instead of passwords on Red Hat, part 2

    Passphrases may be a good alternative to passwords for corporate security. This tip discusses how to configure Red Hat to support passphrases. 

  • Passphrases instead of passwords on Red Hat, part 1

    Passwords may not be the perfect security control for corporate environments, because they are so easily tackled by attackers. Passphrases may provide a better solution, says James Turnbull in this tip, and Red Hat already includes the capability to ... 

  • SELinux Policy Editor: Removing micromanagement from administrative control

    It can be tough to handle extended security attributes across a range of users, processes and files or directories that encompass more than one server. Enter SELinux Policy Editor, seedit, which offers a suite of native front-end administration util... 

  • New Directory Server capabilities coming in RHEL5

    In the upcoming Red Hat Enterprise Linux 5 server distribution, Red Hat Directory Server will be more than a switchboard of IT information. Added identity management features will build up security while easing administration hassles, says Red Hat ex... 

  • Beta flaws vs. security flaws

    Security expert James Turnbull explains why beta flaws can be mistaken for security threats and compares desktop security between Linux and Windows. 

  • Trojans, viruses and targeted browsers

    Security expert James Turnbull debunks the myth that Firefox is safer than IE or Opera. 

  • IPSec in the 2.6 kernel

    Security expert James Turnbull recommends a resource explaining the implementation of IPSec in the 2.6 kernel. 

  • Choosing the most secure distribution

    Security expert James Turnbull opines on the most secure distribution and what criteria to consider when choosing a distribution.