Linux system security best practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to be a 'security warrior,' part 1

    In computer warfare, security admins must go into battle riding on a strong vehicle and armed with effective tools, according to security expert Anton Chuvakin. Fortunately, the security warrior who's protecting Linux has both.

    Chuvakin's securit... 

  • Commentary: Addition of IPsec locks down 2.6 kernel expert adviser Kenneth Milberg comments on the security upgrades in the 2.6 Linux kernel, in particular the addition of IPsec. 

  • Red Hat repairs buffer overflows in Ethereal

    Two buffer overflow vulnerabilities have been repaired in open-source network monitoring software Ethereal. 

  • Linux security learning guide

    Here's a collection of resources to get you up to speed on Linux security. 

  • Dos & Don'ts: Securing e-mail systems

    Want to keep your e-mail systems safe from hacker attacks and spam? Here are a few tips from Stalker Software president and CEO Vladimir Butenko. 

  • Is Linux security right for you? Expert offers guidance

    Securing an enterprise Linux environment can be a tough assignment for Unix or Windows veterans, says author and software engineer Scott Mann. Linux security requires more up-front and ongoing self-education and do-it-yourself work than other platfor... 

  • Linux security: The seven deadly sins

    An author speaking at this week's Enterprise Linux Forum outlines the seven deadly sins of Linux security.