What is LAMP Stack?

What is Stack? The term stack(derived from “solution stack”) refers to a collection of different software programs that “stack” together to create a plateform necesary to support…

Read More

Best Practices of Linux Security

User Security Password Security Securing the root account File System Security System Security User Security Avoid shared accounts Ensure each user is assigned a unique account name…

Read More

Linux Security Tools

Vulnerability Assessment with Nessus Traffic Security with Ethereal Web Proxying with Squid Vulnerability Assessment with Nessus Nessus is a vulnerability assessment tool Comes built-in with most distros…

Read More

How to Detecting and Stopping Attacks in Linux

System Auditing System Logging Network Intrusion Detection with Snort Host File Integrity with Tripwire System Auditing Auditing can track system activities to warn sysadmin of suspicious activity…

Read More

Complete Referance of Secure Networking in Linux

OpenSSH Samba NIS NFS Securing FTP and HTTP servers OpenSSH Open source version of SSH that normally comes with OpenBSD Comes with several distros or downloadable Linux…

Read More

Complete Referance of Linux Security Mechanisms

TCP Wrappers etc/hosts allow and deny inted and xinetd PAMs SELinux Unsecure Linux Utilities TCP Wrappers TCP Wrappers is built into most distros Adds IP filtering capability…

Read More

Complete Referance of Firewalls in Linux Security

Introduction to Firewalls IP Tables Dedicated Linux Firewalls Introduction to Firewalls Firewalls protect network perimeters Not total security solution, but important part of defense in depth strategy…

Read More

Complete Referance of Hardening in Linux Security

System Hardening Overview Batille Securing X-Windows Securing Linux Daemons Security patches Security Benchmarks System Hardening Overview Linux, like other operatingsystems, is not secure “out of the box”…

Read More

Complete Referance of Encryption in Linux Security

Introduction to Encryption Using GNU GPG Using SSH Hashing Utilities Using PKI Certificates in Linux Introduction to Ecryption Linux has built-in ability to encrypt files Protects files…

Read More

Complete Referance of Linux Security

Course Outline Introduction To Linux Security A Bit About Linux Current Security Problems which is more secure: Windows vs Linux? Requirements of a Secure OS Overview of…

Read More