07-18-2006
Unix/Linux security
Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually.
Does anyone know of a good site that will show me what to do - including the commands that I/we could copy and paste?
Any help and direction would be appreciated!
Thanks,
JR
6 More Discussions You Might Find Interesting
1. News, Links, Events and Announcements
have a look:
http://www.softpanorama.org/Solaris/Whitepaper/index.shtml#Executive_Summary
gP (4 Replies)
Discussion started by: pressy
4 Replies
2. Cybersecurity
I am newer to Linux/Unix/RedHat etc... I run a Linux root server with some 55 domain names, about 3 months ago the server was exploited. I need some good advice as far as Firewell's go and getting everything up and running. It was a pain in my *** and cost a lot of time and money.. Thanks! (0 Replies)
Discussion started by: denveraccess
0 Replies
3. UNIX for Advanced & Expert Users
Hi all, :)
I'm quite new with installation of security patches in Linux Redhat Enterprise, here's my question.
I have 2 machine of this RHEL(never patch before) since it never connects directly to the internet(block by firewall) and I want to update the patches now because my boss asked me to... (1 Reply)
Discussion started by: flekzout
1 Replies
4. Cybersecurity
Hey Folks,
What are the ways we can provide security to kernels.
How can I make my Kernel Unique and not allow anyone to replace my Unique kernel with a standard one.
How can i implement measures to avoid any user to replace or modify GRUB and Kernel...?
Need help on this
Thank you (8 Replies)
Discussion started by: Vabiosis
8 Replies
5. Solaris
Hi,
I would like to know, how can I set limits (noproc,fsize,core, data...) to users in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf
Thanks!! (0 Replies)
Discussion started by: kiekurt
0 Replies
6. Cybersecurity
The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary... (1 Reply)
Discussion started by: reve-secure
1 Replies
LEARN ABOUT DEBIAN
mh_installsite
MAVEN(1) User Commands MAVEN(1)
NAME
Maven - Installs site.xml into /usr/share/maven-repo.
SYNOPSIS
mh_installsite [option]... [pom] [site-file]
DESCRIPTION
Installs the site.xml file in /usr/share/maven-repo, at the correct location for Maven.
Where
[pom] is the location of the POM associated with the site.xml file to install.
GroupId, artifactId and version will be extracted from this file.
[site-file] is the location of the site.xml to install.
OPTIONS
-h --help: show this text
-V --version: show the version
-p<package> --package=<package>: name of the Debian package which
will contain the site file
-e<version>, --set-version=<version>: set the version for the artifact,
do not use the version declared in the POM file.
-r<rules> --rules=<rules>: path to the file containing the
rules to apply when cleaning the POM. Optional, the default location is debian/maven.rules Maven rules are used here to extract the
groupId, artifactId and version from the POM file.
-v --verbose: show more information while running
-n --no-act: don't actually do anything, just print the results
--skip-clean-pom: don't clean the pom, assume that a previous action ran
mh_cleanpom with the correct options. mh_cleanpom is run only to extract the groupId, artifactId and version of the jar
See also: mh_installpom(1), mh_installjar(1)
Maven Repo Helper version 1.7.1 January 2012 MAVEN(1)