Sponsored Content
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Celebrity advice on keeping your Linux desktop secure Post 302161733 by Linux Bot on Friday 25th of January 2008 04:50:09 PM
Old 01-25-2008
Celebrity advice on keeping your Linux desktop secure

Fri, 25 Jan 2008 21:00:00 GMT
One of the main reasons people move from Windows to Linux is the promise of greater security from malware on the Internet. Everyone knows you need to add extra security to try to keep a Windows desktop safe, but what do you have to do to accomplish the same thing on Linux? To answer that question, we asked a number of well-known Linux kernel hackers and a security expert for their thoughts on the matter.


Source...
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Advice on UNIX/Linux

I have 6 extra hard drives and want to install them in my boxes and run UNIX, LINUX andyes M$ Winblows. How do I make it so i have the choice of which HD to boot from? Also, which UNIX distribution should i run to get aquainted with it, and wheres the best place to get it? Thank you very much if... (5 Replies)
Discussion started by: r1sk
5 Replies

2. UNIX for Dummies Questions & Answers

Just started linux any advice??

well i just got into this and really dont know anything so if anyone has any reccomendations like books/sites/forums/or just general advice or if anyone wants to help me get started i would really appreciate it thank you very much (6 Replies)
Discussion started by: Necrons
6 Replies

3. Linux

How secure is Postfix/Saslauth2 on Linux?

How secure is Postfix/saslauth2 on Linux, I'm setting up this stuff as an email server, but concerned about security? Thanks (1 Reply)
Discussion started by: bubujake
1 Replies

4. Linux

Keeping same emc sudo name in Linux

Hi, I have Suse Linux Enterprise Server 10 installed on two node ocfs2 cluster my server. Node-1 is ptdmod01 and Node-2 is ptdmod02. It is having 218 ocfs file system, which are shared among both servers. Since this is ocfs2, each disk from EMC Storage is mounted individually on file-system as... (4 Replies)
Discussion started by: solaris_1977
4 Replies

5. UNIX for Dummies Questions & Answers

Copying a file from secure host to desktop

I have extremely limited programming experience so please go slowly! I am remotely logged in to a secure network cluster via my username at my school through terminal. I'm trying to download a file from my account on the cluster to my desktop on a guest account on my mac. I tried doing this:... (1 Reply)
Discussion started by: smashingdols
1 Replies

6. Shell Programming and Scripting

Need advice for project UNIX to Linux migration

I am working on UNIX AIX to Linux migration. Does anybody know the good site for doing this? Thanks for contribution (4 Replies)
Discussion started by: digioleg54
4 Replies
secsetup(8)						      System Manager's Manual						       secsetup(8)

Name
       secsetup - enable the enhanced security features

Syntax
       /usr/etc/sec/secsetup

Description
       The command is an interactive facility that allows you to enable the enhanced security features on your system.	You must first have loaded
       the enhanced security subset onto your system before running the command.

       The command allows you to configure your system either for security auditing, trusted path, enhanced login, or  any  combination  of  those
       features.  In addition, the command may add lines to the file.  To remove entries from the you must edit it by hand.  The command only adds
       lines to this file if they aren't already present.  You can run while the system is in multiuser mode (however,	some  inconsistencies  may
       result  from  this.   See the Security Guide for Administrators for more information).  To run type the following and then answer the ques-
       tions that follow:
       # /usr/etc/sec/secsetup
       Depending on the security features chosen, when completes you may need to replace your system's kernel and reboot the system.  For example,
       chosing either the security auditing or trusted path feature may require you to re-build your kernel.

Files
See Also
       set_audit_mask(8), auth(5), svc.conf(5)
       Security Guide for Administrators

																       secsetup(8)
All times are GMT -4. The time now is 03:59 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy