What is LAMP Stack?
What is Stack? The term stack(derived from “solution stack”) refers to a collection of different software programs that “stack” together to create a plateform necesary to support application software. These…
Read more »Best Practices of Linux Security
User Security Password Security Securing the root account File System Security System Security User Security Avoid shared accounts Ensure each user is assigned a unique account name and a unique…
Read more »Linux Security Tools
Vulnerability Assessment with Nessus Traffic Security with Ethereal Web Proxying with Squid Vulnerability Assessment with Nessus Nessus is a vulnerability assessment tool Comes built-in with most distros More than just…
Read more »How to Detecting and Stopping Attacks in Linux
System Auditing System Logging Network Intrusion Detection with Snort Host File Integrity with Tripwire System Auditing Auditing can track system activities to warn sysadmin of suspicious activity Allows sysadmin to…
Read more »Complete Referance of Secure Networking in Linux
OpenSSH Samba NIS NFS Securing FTP and HTTP servers OpenSSH Open source version of SSH that normally comes with OpenBSD Comes with several distros or downloadable Linux ports have ‘p’…
Read more »Complete Referance of Linux Security Mechanisms
TCP Wrappers etc/hosts allow and deny inted and xinetd PAMs SELinux Unsecure Linux Utilities TCP Wrappers TCP Wrappers is built into most distros Adds IP filtering capability Enables access logging…
Read more »Complete Referance of Firewalls in Linux Security
Introduction to Firewalls IP Tables Dedicated Linux Firewalls Introduction to Firewalls Firewalls protect network perimeters Not total security solution, but important part of defense in depth strategy Firewalls act as…
Read more »Complete Referance of Hardening in Linux Security
System Hardening Overview Batille Securing X-Windows Securing Linux Daemons Security patches Security Benchmarks System Hardening Overview Linux, like other operatingsystems, is not secure “out of the box” Security increases as…
Read more »Complete Referance of Encryption in Linux Security
Introduction to Encryption Using GNU GPG Using SSH Hashing Utilities Using PKI Certificates in Linux Introduction to Ecryption Linux has built-in ability to encrypt files Protects files in storage Protection…
Read more »Complete Referance of Linux Security
Course Outline Introduction To Linux Security A Bit About Linux Current Security Problems which is more secure: Windows vs Linux? Requirements of a Secure OS Overview of Linux Security Features…
Read more »