Linux Learn Tips and Tricks - Page 16
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Log files are the central place to find information about problematic system errors.
AIDE, Advanced Intrusion Detection Environment, is a file integrity checker, a type of intrusion detection program.
Reducing the risk of intrusion can be achieved by eliminating many of the known common problems.
Tripwire is a program that monitors file integrity by maintainig a database of cryptographic signature for programs.
The first step to an attack is to see what services a server is running, which is done with a port scan of the server.
The best way to be protected from buffer overflows is to not have them in the code that is run
Telnet is a popular way to access a remote system, unfortunately, it is incredibly insecure.
Several independant kernel patches exist to increase the security in your kernel
The BIOS is the lowest level of software that configures or manipulates your x86-based hardware.
Sensitive information that only certain people need to have web access to must be secured.