Linux Security
    Linux Security
    Linux Security

    How to properly secure sysctl on Linux

    Date 08 May 2020
    Posted By Brittany Day

    Protecting Linux servers against SYN attacks and IP spoofing is surprisingly simple. Jack Wallen shows you how in a great tutorial.

    The sysctl system allows you to make changes to a running Linux kernel. This utility reads and modifies various attributes of the kernel, such as version number, maximum limits, and a number of security settings. 

    The sysctl system also allows you to prevent things like SYN flood attacks and IP address spoofing. It also logs several types of suspicious packets--spoofed packets, source-routed packets, and redirects.

    You can modify kernel parameters at runtime with the sysctl command or you can make changes within the system's configuration file so those changes are more of a permanent nature.


    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"158","title":"True","votes":"18","type":"x","order":"1","pct":3.51,"resources":[]},{"id":"159","title":"False","votes":"495","type":"x","order":"2","pct":96.49,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.