Sponsored Content
Special Forums Cybersecurity How to know when you've been hacked Post 302235136 by redoubtable on Thursday 11th of September 2008 08:40:47 AM
Old 09-11-2008
Linux kernel LSM and NSA's selinux project if researched/explored well enough can give a great level of security. I'm using selinux in several servers and I almost stopped caring about outdated software.
 

3 More Discussions You Might Find Interesting

1. Linux

pc hacked

Hi, i think someone has hacked my server, the following rules used to come which i haven't put. Please help me i couldnt find out how this rules are apply, i think someone has put an script which generates enables the rules. But after restarting the iptables everything seems to be working... (0 Replies)
Discussion started by: naik_mit
0 Replies

2. Cybersecurity

Server hacked on known port

Hi, There is a recent case whereby it was reported that one of the production servers was hacked on port 1521. However, I am not sure how this was possible, as I checked that the OS firewall (iptables) is on : # /etc/init.d/iptables status Table: nat Chain PREROUTING (policy ACCEPT) num ... (7 Replies)
Discussion started by: anaigini45
7 Replies

3. Cybersecurity

Our system was hacked

Someone made a mistake, and left our router wide open, pointing all ports to a SCO 6.0.0 system. Within 24 hours, the following happened. The contents of all the files (except tar files) in three directories, one directory on each of three different file systems, were replaced with nulls. None... (3 Replies)
Discussion started by: jgt
3 Replies
selinux-config-enforcing(8)				      System Manager's Manual				       selinux-config-enforcing(8)

NAME
selinux-config-enforcing - change /etc/selinux/config to set enforcing or permissive modes SYNOPSIS
selinux-config-enforcing [permissive] DESCRIPTION
selinux-config-enforcing this command will modify /etc/selinux/config to specify whether SE Linux should be in enforcing or permissive mode on boot. This may be overridden by the "enforcing=" kernel command-line option (which takes the value 0 for permissive and 1 for enforc- ing). The parameter "0" or "permissive" will cause it to set permissive mode, any other parameter will result in enforcing mode being set. SEE ALSO
selinux(8), sestatus(8), selinuxenabled(1), load_policy(8), semodule(8), postfix-nochroot(8), check-selinux-installation(8), selinux-pol- icy-upgrade(8), http://wiki.debian.org/SELinux - More about SELinux Debian install, http://etbe.coker.com.au/tag/selinux/ - Russell's SE Linux blog posts. AUTHOR
This program and it's man page was written by Russell Coker <russell@coker.com.au> for the Debian system (but may be used by others). Per- mission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 3. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL-3. selinux-config-enforcing(8)
All times are GMT -4. The time now is 09:09 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy