
linuxsecurityresource.blogspot.com
Linux Security ResourceRandom musings on Linux Security Topics
http://linuxsecurityresource.blogspot.com/
Random musings on Linux Security Topics
http://linuxsecurityresource.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Tuesday
LOAD TIME
0.3 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
17
SSL
EXTERNAL LINKS
0
SITE IP
172.217.9.225
LOAD TIME
0.279 sec
SCORE
6.2
Linux Security Resource | linuxsecurityresource.blogspot.com Reviews
https://linuxsecurityresource.blogspot.com
Random musings on Linux Security Topics
Linux Security Resource: January 2010
http://linuxsecurityresource.blogspot.com/2010_01_01_archive.html
Thursday, January 21, 2010. Multi-Party Authorization basically requires that at least 2 authorized individuals need to authenticate before the data can be accessed. This "2 key" approach is sort of like the launch control for a nuclear Missile that requires 2 different people to turn keys before blowing up some small corner of the world. Subscribe to: Posts (Atom). Open SuSE Security Page. Red Hat Security Page. Knoppix Security Tool Distribution. Hardening Your Linux System (from OpenSuSE.org). I've be...
Linux Security Resource: January 2011
http://linuxsecurityresource.blogspot.com/2011_01_01_archive.html
Friday, January 21, 2011. Creating Certificates with Multiple Hostnames. And www.example.org. You need to tell openssl to create a CSR that includes x509 V3 extensions and you also need to tell openssl to include a list of subject alternative names in your CSR. In my openssl.cnf I have the following:. In the [req] section. Req extensions = v3 req. In the v3 req section. Extensions to add to a certificate request. KeyUsage = nonRepudiation, digitalSignature, keyEncipherment. SubjectAltName = @alt names.
Linux Security Resource: September 2010
http://linuxsecurityresource.blogspot.com/2010_09_01_archive.html
Tuesday, September 28, 2010. Use aide to monitor core system configuration files. AIDE (Advanced Intrusion Detection Environment) can be used to help track file integrity by comparing a 'snapshot' of the system's files prior to and after a suspected incident. It is a freeware version of Tripwire, AIDE uses a database to accumulate key file attributes like permissions, mtime, ctime, and number of links for a system. The idea is to build the database before 2 things occur:. Then i have the aide.log mai...
Linux Security Resource: March 2011
http://linuxsecurityresource.blogspot.com/2011_03_01_archive.html
Wednesday, March 30, 2011. Disk Performance Trending in Linux:. The Disk i/o system is often the slowest subsystem on the computer and one of the biggest bottlenecks in system performance. Disk i/o is critical for certain applications,. This document is a summary of the key factors that affect overall disk performance on the system and references for some tools that can be used to measure these factors on Linux Servers. Timing buffered disk reads: 154 MB in 3.01 seconds = 51.14 MB/sec. Here is the same d...
Linux Security Resource: keep user accessible data on separate disk partitions
http://linuxsecurityresource.blogspot.com/2010/10/keep-user-accessible-data-on-separate.html
Wednesday, October 20, 2010. Keep user accessible data on separate disk partitions. Separation of the operating system files from user files may result in a more secure system. ideally the following filesystems should be mounted on separate partitions:. I also suggest separate partitions for Apache and FTP server roots. Edit /etc/fstab file and make sure you add the following configuration options:. Do not set execution of any binaries on this partition (prevents execution of binaries but allows scripts).
TOTAL PAGES IN THIS WEBSITE
17
This Server is Working Fine
Your IP address is : 66.160.134.62. This Server is Working Fine.
امنیت سیستم های linux
امنیت سیستم های linux. منبع و جزوه دوره پیشرفته امنیت سیستم های لینوکس. مواردی مربوط به بهینه سازی و بالا رفتن کیفیت کار Squid با انتخاب سخت افزار مناسب. چهار عامل به طور کلی در انتخاب سخت افزارها مهم هستند :. نوشته شده در ۸۹/۰۳/۱۲ساعت 14:40 توسط مهیار تاج دینی. دانلود دیسک زنده فدورا 12. برای دانلود دیسک زنده لینوکس فدورا ۱۲ از لینک زیر استفاده کنید ضمن اینکه دقیقا ۷ روز آینده نسخه ۱۳ آن منتشر خواهد شد. Get Fedora 12 Desktop Edition Now. نوشته شده در ۸۹/۰۲/۲۹ساعت 11:21 توسط مهیار تاج دینی. DNS , Hostname.
Home - The Community's Center for Security
The central voice for Linux and Open Source security news. What is the most important Linux security technology? SUSE: 2018:0866-1: important: coreutils. Ubuntu 3617-2: Linux (HWE) vulnerabilities. Ubuntu 3617-1: Linux kernel vulnerabilities. Debian LTS: DLA-1339-1: openjdk-7 security update. SUSE: 2018:0863-1: important: clamav. SUSE: 2018:0861-1: important: libvirt. RedHat: RHSA-2018-0627:01 Important: Red Hat JBoss Enterprise Application. Linux Security Week: April 2nd, 2018. InfoSecurity - Posted by.
Default Web Site Page
If you are the owner of this website, please contact your hosting provider: webmaster@linuxsecurity.com.pe. It is possible you have reached this page because:. The IP address has changed. The IP address for this domain may have changed recently. Check your DNS settings to verify that the domain is set up correctly. It may take 8-24 hours for DNS changes to propagate. It may be possible to restore access to this site by following these instructions. For clearing your dns cache.
Securing and Hardening Linux | Tips and Howto Linux Security
Securing and Hardening Linux. BIOS Security, Password Protection, and Limiting Reboots. January 2, 2008. Most modern computer BIOSes allow the restriction of bootable devices and password protection for BIOS settings. Different systems use different keystrokes to enter into the BIOS setup but the common ones are the Del key for AMI BIOS, Ctrl Esc for Phoenix BIOS, and the F10 key for Compaq BIOS. (more…). Recently on Securing and Hardening Linux…. Disable Internet Daemon Services. December 22, 2007.
linuxsecurityresource.blogspot.com
Linux Security Resource
Wednesday, March 30, 2011. Disk Performance Trending in Linux:. The Disk i/o system is often the slowest subsystem on the computer and one of the biggest bottlenecks in system performance. Disk i/o is critical for certain applications,. This document is a summary of the key factors that affect overall disk performance on the system and references for some tools that can be used to measure these factors on Linux Servers. Timing buffered disk reads: 154 MB in 3.01 seconds = 51.14 MB/sec. Here is the same d...
Non-Existent Domain
Your browser does not support iframes, please click here.
linuxsecuritytutorials.com - This website is for sale! - linuxsecuritytutorials Resources and Information.
The domain linuxsecuritytutorials.com. May be for sale by its owner! This page provided to the domain owner free. By Sedo's Domain Parking. Disclaimer: Domain owner and Sedo maintain no relationship with third party advertisers. Reference to any specific service or trade mark is not controlled by Sedo or domain owner and does not constitute or imply its association, endorsement or recommendation.
WordPress › Setup Configuration File
Welcome to WordPress. Before getting started, we need some information on the database. You will need to know the following items before proceeding. Table prefix (if you want to run more than one WordPress in a single database). We’re going to use this information to create a. File If for any reason this automatic file creation doesn’t work, don’t worry. All this does is fill in the database information to a configuration file. You may also simply open.
Coming soon...
Coming soon...