Linux system security best practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The Linux desktop: Browser and distro security tips

    Don't be fooled. Firefox is no more secure than Opera or Internet Explorer, says security expert James Turnbull. The author of "Hardening Linux" explains why distro security can be subjective, what basic steps users can take to protect themselves fr... 

  • Closing code won't save you

    Security expert James Turnbull explains why equating safety with hiding your source code is a fallacy. 

  • Blocking unauthorized IPs

    Security expert James Turnbull offers two ways for blocking unauthorized IPs. 

  • SELinux Policy Editor: Removing micromanagement from administrative control

    It can be tough to handle extended security attributes across a range of users, processes and files or directories that encompass more than one server. Enter SELinux Policy Editor, seedit, which offers a suite of native front-end administration util... 

  • Passphrases instead of passwords on Red Hat, part 1

    Passwords may not be the perfect security control for corporate environments, because they are so easily tackled by attackers. Passphrases may provide a better solution, says James Turnbull in this tip, and Red Hat already includes the capability to ... 

  • Passphrases instead of passwords on Red Hat, part 2

    Passphrases may be a good alternative to passwords for corporate security. This tip discusses how to configure Red Hat to support passphrases. 

  • New Directory Server capabilities coming in RHEL5

    In the upcoming Red Hat Enterprise Linux 5 server distribution, Red Hat Directory Server will be more than a switchboard of IT information. Added identity management features will build up security while easing administration hassles, says Red Hat ex... 

  • Beta flaws vs. security flaws

    Security expert James Turnbull explains why beta flaws can be mistaken for security threats and compares desktop security between Linux and Windows. 

  • Trojans, viruses and targeted browsers

    Security expert James Turnbull debunks the myth that Firefox is safer than IE or Opera. 

  • IPSec in the 2.6 kernel

    Security expert James Turnbull recommends a resource explaining the implementation of IPSec in the 2.6 kernel.