How To Harden My Filesystem - Page 1.25
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Linux has different security permissions, each impacting what can be done with a file and a directory.
Welcome to the world of Linux, where downloading files is a vital part of everyday tasks. Whether you’re a Linux enthusiast or a casual user, knowing how to download files efficiently is essential for your productivity. In this article, we will explore various methods and commands that you can use to download files in Linux.
Backups are the backbone of an organization. One of the efficient way to back up your files is to use the Rsync utility. Rsync is a powerful tool for efficiently transferring files between computers over a network.
As you learn Ubuntu, you find that you need to change the ownership of a folder or even its subfolders. Why is this important? Whether you’re an administrator managing multi-user environments or a regular user consolidating data, changing folder ownership can serve several key purposes.
SARA is the Security Auditor's Research Assistant. SARA is based on the SATAN security analysis model and is frequently updated to address the latest security threats.
This version of Linux has a strong, flexible mandatory access control architecture incorporated into the major subsystems of the kernel. The system provides a mechanism to enforce the separation of information based on confidentiality and integrity
Linux-related security issues are an increasing threat to businesses. Discover a solution that protects complex networks with vital on-access scanning capabilities, automatic updating and intuitive management functions.
This document is a an overview of the basic steps required to secure a Linux installation from intrusion. It is intended to be an introduction.
Looking for the easiest method for protecting a file behind a layer of encryption in Linux? Here are two easy ways.
The contents of the /etc/group file can seem cryptic at first. But all it contains is information on locally configured groups on a Linux system.
Suppose you want to transfer some files between servers on a Linux system. There are many ways you can accomplish the task, but if your priority is to transfer files securely, you’re left with a few options.
It's easy to secure the contents of a text file on Linux by encrypting it with Vim.
There’s a lot more to working with files on Linux than creating, listing and updating them. After all, files can be Linux commands (i.e., binaries), scripts, images, simple text files, pointers to other files or folders. You might remember the "everything is a file" description of Unix and Linux systems.
Tomb is a simple shell script that allows you to encrypt files in Linux. Unlike full disk encryption, Tomb enables you to only include the files and folders that you want to encrypt. Here we show you how to install and use Tomb on Ubuntu.
The people who can use the Linux sudo command are members of a small and select club, sometimes called the “sudoers” list. Each member has the same powers as root. So how do you join that club? We’ll walk through adding a person to sudoers as well as editing the sudoers file to limit permissions.
File transfer over a network can be done in various ways and using different protocols. The most commonly used protocols for copying files remotely are Rsync, SCP and SFTP.
The Linux rsync command is a powerful file copying and folder synchronization tool. Here are ten common use-cases that you’ll be able to put to good use on your own systems.
File permissions are critical for the security of a Linux system. But how do you set default permissions for new files on Linux?
Chroot is a Linux/Unix utility that can change or modify the root filesystem. With the help of the chroot command, you can easily create an isolated filesystem inside your primary filesystem. Chroot is especially helpful to make your work and home environment separated or if you want a test environment to test software in isolation.
In Linux, all directories and files have access permissions. You can use chmod to set your preferred access rights for different users. But what decides their default permissions? Let’s talk about umask.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.