05-16-2012
This is a vague question because Linux, unlike Windows, covers a huge range of possibilities from embedded wireless routers to multi-kiloton supercomputers, running any combination of software I can think of and lots I haven't. Linux is the 5-megabyte file your bootloader loads when you power on your computer. Everything else, everything, is application software.
I don't know of any serious vulnerabilities in the Linux kernel. Any which were discovered in the past were corrected quickly enough to not be seriously exploited. People don't usually bother trying to invade Linux itself, or even trying to root it -- they exploit known problems inside applications like Wordpress, Webmin, and the like to create and run their own programs on the server.
A properly configured Linux system can be extremely secure. You can take it pretty much as far as you like. You can even do things like install selinux, to prevent the execution of any software you don't trust.
And yes, you can make most any system as secure (or insecure) as you like.
8 More Discussions You Might Find Interesting
1. Linux
i have heard that you can have 2 computers running and mak it so one syste will use the other systems CPU though the network or some thing like that. first, is this true? if so how do i set it up with Mandrake 9.2 or higher? (6 Replies)
Discussion started by: linux_newbe
6 Replies
2. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be
produced.... (0 Replies)
Discussion started by: paradise
0 Replies
3. AIX
I have a following requirement in production
system 1 : LINUX
User: abcd
system 2: AIX (it is hosting a production DB)
Requirement
user abcd from system 1 should have read access on archive log files created by DB on system 2. The log files are created with permissions 540 by user ora ,... (2 Replies)
Discussion started by: amitnm1106
2 Replies
4. Shell Programming and Scripting
We would be migrating UNIX file system to Linux file system.
We do have many directory and sub directories with files.
after migrating unix to linux file system , i want to make sure all the files has been copied ? What would be the best approach to validate directory ,sub-directory and file... (1 Reply)
Discussion started by: balajikalai
1 Replies
5. Programming
Hi all
What is the qualification required by Linux/Solaris System Administrator to become a Linux/Solaris System Programmer as to gain complete knowledge on computers.
Thanks (1 Reply)
Discussion started by: Tlogine
1 Replies
6. Linux
Hi all,
I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also.
Thank you,
Andreea (0 Replies)
Discussion started by: andreea9322
0 Replies
7. Infrastructure Monitoring
Hi all,
I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also.
Thank you,
Andreea (1 Reply)
Discussion started by: andreea9322
1 Replies
8. UNIX for Advanced & Expert Users
System is down, I can't seem to get in. It's VM so I took screen shot and upload the file here. Its a RTF file format.
when system comes up, I did press e then in the middle as you can see, I typed init=/bin/bash, I pressed CTRL -X. Then I should get prompt but not getting that. I get... (4 Replies)
Discussion started by: samnyc
4 Replies