How To Harden My Filesystem
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Linux offers over 1,000 commands for a simple service. This number increases when you move to the desktop. In Pop!_OS, for example, /usr/bin has 1,615 commands, and /usr/sbin has 609. There are more than 2,000 commands available.
Linux deletes directories and files using the rm Linux command. You need to know what will happen when you press "Enter" to use this tool in a safe manner. Here's what you need to understand to use the rm Linux command securely and effectively.
Linux file permissions enable you to allow or prevent other users from viewing your files, making them crucial to robust security and privacy. But how can you change file and folder permissions on Linux from the Command Line to improve the security of your filesystem?
Today we'll cover how to encrypt and securely transfer files using GPG. GPG is a free, open-source encryption program that uses public-key cryptography, which means you can send encrypted files without ever having to send your private key over email or any other insecure channel. The only way to decrypt the file is if you have both your public and private keys, which means even if someone were able to intercept and read the message before it reached its intended recipient, it would be useless without the private key.
This documentation discusses all aspects of passphrases, how to make them strong and how to crack them.
Linux has different security permissions, each impacting what can be done with a file and a directory.
Welcome to the world of Linux, where downloading files is a vital part of everyday tasks. Whether you’re a Linux enthusiast or a casual user, knowing how to download files efficiently is essential for your productivity. In this article, we will explore various methods and commands that you can use to download files in Linux.
Backups are the backbone of an organization. One of the efficient way to back up your files is to use the Rsync utility. Rsync is a powerful tool for efficiently transferring files between computers over a network.
As you learn Ubuntu, you find that you need to change the ownership of a folder or even its subfolders. Why is this important? Whether you’re an administrator managing multi-user environments or a regular user consolidating data, changing folder ownership can serve several key purposes.
SARA is the Security Auditor's Research Assistant. SARA is based on the SATAN security analysis model and is frequently updated to address the latest security threats.
This version of Linux has a strong, flexible mandatory access control architecture incorporated into the major subsystems of the kernel. The system provides a mechanism to enforce the separation of information based on confidentiality and integrity
Linux-related security issues are an increasing threat to businesses. Discover a solution that protects complex networks with vital on-access scanning capabilities, automatic updating and intuitive management functions.
This document is a an overview of the basic steps required to secure a Linux installation from intrusion. It is intended to be an introduction.
Looking for the easiest method for protecting a file behind a layer of encryption in Linux? Here are two easy ways.
The contents of the /etc/group file can seem cryptic at first. But all it contains is information on locally configured groups on a Linux system.
Suppose you want to transfer some files between servers on a Linux system. There are many ways you can accomplish the task, but if your priority is to transfer files securely, you’re left with a few options.
It's easy to secure the contents of a text file on Linux by encrypting it with Vim.
There’s a lot more to working with files on Linux than creating, listing and updating them. After all, files can be Linux commands (i.e., binaries), scripts, images, simple text files, pointers to other files or folders. You might remember the "everything is a file" description of Unix and Linux systems.
Tomb is a simple shell script that allows you to encrypt files in Linux. Unlike full disk encryption, Tomb enables you to only include the files and folders that you want to encrypt. Here we show you how to install and use Tomb on Ubuntu.
The people who can use the Linux sudo command are members of a small and select club, sometimes called the “sudoers” list. Each member has the same powers as root. So how do you join that club? We’ll walk through adding a person to sudoers as well as editing the sudoers file to limit permissions.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.