Linux system security best practices

Email Alerts

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Bytes: Microsoft pulls back user-based encryption

    Microsoft has pulled the Windows add-on Private Folder 1.0 after enterprise customers questioned the logic of letting individual employees encrypt their own data. 

  • Nagios offers open source option for network monitoring

    IT shops using HP or BMC monitoring tools might want to take Nagios for a test-drive. "Pro Nagios 2.0" author James Turnbull explains why. 

  • Linux, virtualization help GHY meet post-9/11 requirements

    In the post-9/11 world, security measures have been tightened, especially in the import/export industry. Learn how one firm used Linux and hardware virtualization to keep up with changing rules and add flexibility to client IT environments. 

  • E-mail privacy with PGP

    Using PGP and GPG for e-mail encryption, decryption and digital signatures can give you the keys to digital security and keep your IT shop safe from spoofing and hacking. 

  • Open source security in government

    IT managers often fret about security when choosing between proprietary and open source solutions, but experts say not to worry. In many cases open source actually provides greater security. Writer Andrew Bardin Williams explains the benefits of open... 

  • Some old, some new: the seven deadly sins of Linux security

    SearchOpenSource.com revisits the topic of Linux security with a new and improved – but startlingly similar – version of the seven deadly sins of Linux security. 

  • Mozilla issues Firefox mega-fix

    The digital underground could exploit as many as seven flaws to bypass security restrictions, compromise sensitive data and launch cross-site scripting attacks. 

  • 2006 phish tales: Flawed and fishy defenses

    Phishing expert Lance James describes the failures of some IT security defenses against phishing. 

  • Users get to the root of Linux security holes

    While identifying Microsoft as a large source of IT security snafus, respondents to a SearchOpenSource.com survey also found holes in Linux security. 

  • 2006 phish tales, part 1: Worse on Linux or Windows?

    Phishing expert Lance James differentiates between media hype and legitimate security concerns. He exposes Windows and Linux flaws.