Sponsored Content
Full Discussion: Linux system
Operating Systems Linux Linux system Post 302641683 by Corona688 on Wednesday 16th of May 2012 11:34:57 AM
Old 05-16-2012
This is a vague question because Linux, unlike Windows, covers a huge range of possibilities from embedded wireless routers to multi-kiloton supercomputers, running any combination of software I can think of and lots I haven't. Linux is the 5-megabyte file your bootloader loads when you power on your computer. Everything else, everything, is application software.

I don't know of any serious vulnerabilities in the Linux kernel. Any which were discovered in the past were corrected quickly enough to not be seriously exploited. People don't usually bother trying to invade Linux itself, or even trying to root it -- they exploit known problems inside applications like Wordpress, Webmin, and the like to create and run their own programs on the server.

A properly configured Linux system can be extremely secure. You can take it pretty much as far as you like. You can even do things like install selinux, to prevent the execution of any software you don't trust.

And yes, you can make most any system as secure (or insecure) as you like.
 

8 More Discussions You Might Find Interesting

1. Linux

2 in 1 Linux system

i have heard that you can have 2 computers running and mak it so one syste will use the other systems CPU though the network or some thing like that. first, is this true? if so how do i set it up with Mandrake 9.2 or higher? (6 Replies)
Discussion started by: linux_newbe
6 Replies

2. Homework & Coursework Questions

Operating system LINUX

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be produced.... (0 Replies)
Discussion started by: paradise
0 Replies

3. AIX

Accessing files on AIX system from Linux system

I have a following requirement in production system 1 : LINUX User: abcd system 2: AIX (it is hosting a production DB) Requirement user abcd from system 1 should have read access on archive log files created by DB on system 2. The log files are created with permissions 540 by user ora ,... (2 Replies)
Discussion started by: amitnm1106
2 Replies

4. Shell Programming and Scripting

UNIX file system to Linux file system migration

We would be migrating UNIX file system to Linux file system. We do have many directory and sub directories with files. after migrating unix to linux file system , i want to make sure all the files has been copied ? What would be the best approach to validate directory ,sub-directory and file... (1 Reply)
Discussion started by: balajikalai
1 Replies

5. Programming

Linux/Solaris System Administrator to become a Linux/Solaris System Programmer?

Hi all What is the qualification required by Linux/Solaris System Administrator to become a Linux/Solaris System Programmer as to gain complete knowledge on computers. Thanks (1 Reply)
Discussion started by: Tlogine
1 Replies

6. Linux

Best Linux monitoring system

Hi all, I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also. Thank you, Andreea (0 Replies)
Discussion started by: andreea9322
0 Replies

7. Infrastructure Monitoring

Best system monitoring for Linux

Hi all, I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also. Thank you, Andreea (1 Reply)
Discussion started by: andreea9322
1 Replies

8. UNIX for Advanced & Expert Users

Please help Linux system is down...

System is down, I can't seem to get in. It's VM so I took screen shot and upload the file here. Its a RTF file format. when system comes up, I did press e then in the middle as you can see, I typed init=/bin/bash, I pressed CTRL -X. Then I should get prompt but not getting that. I get... (4 Replies)
Discussion started by: samnyc
4 Replies
service_seusers(5)					       SELinux configuration						service_seusers(5)

NAME
service_seusers - The SELinux GNU/Linux user and service to SELinux user mapping configuration files DESCRIPTION
These are optional files that allow services to define an SELinux user when authenticating via SELinux-aware login applications such as PAM(8). There is one file for each GNU/Linux user name that will be required to run a service with a specific SELinux user name. The path for each configuration file is formed by the path returned by selinux_policy_root(3) with /logins/username appended (where user- name is a file representing the GNU/Linux user name). The default services directory is located at: /etc/selinux/{SELINUXTYPE}/logins Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)). getseuser(3) reads this file to map services to an SELinux user. FILE FORMAT
Each line within the username file is formatted as follows with each component separated by a colon: service:seuser[:range] Where: service The service name used by the application. seuser The SELinux user name. range The range for MCS/MLS policies. EXAMPLES
Example 1 - for the 'root' user: # ./logins/root ipa:user_u:s0 this_service:unconfined_u:s0 Example 2 - for GNU/Linux user 'rch': # ./logins/rch ipa:unconfined_u:s0 that_service:unconfined_u:s0 SEE ALSO
selinux(8), PAM(8), selinux_policy_root(3), getseuser(3), selinux_config(5) Security Enhanced Linux 28-Nov-2011 service_seusers(5)
All times are GMT -4. The time now is 10:05 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy