Celebrity advice on keeping your Linux desktop secure


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Celebrity advice on keeping your Linux desktop secure
# 1  
Old 01-25-2008
Celebrity advice on keeping your Linux desktop secure

Fri, 25 Jan 2008 21:00:00 GMT
One of the main reasons people move from Windows to Linux is the promise of greater security from malware on the Internet. Everyone knows you need to add extra security to try to keep a Windows desktop safe, but what do you have to do to accomplish the same thing on Linux? To answer that question, we asked a number of well-known Linux kernel hackers and a security expert for their thoughts on the matter.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Need advice for project UNIX to Linux migration

I am working on UNIX AIX to Linux migration. Does anybody know the good site for doing this? Thanks for contribution (4 Replies)
Discussion started by: digioleg54
4 Replies

2. UNIX for Dummies Questions & Answers

Copying a file from secure host to desktop

I have extremely limited programming experience so please go slowly! I am remotely logged in to a secure network cluster via my username at my school through terminal. I'm trying to download a file from my account on the cluster to my desktop on a guest account on my mac. I tried doing this:... (1 Reply)
Discussion started by: smashingdols
1 Replies

3. Linux

Keeping same emc sudo name in Linux

Hi, I have Suse Linux Enterprise Server 10 installed on two node ocfs2 cluster my server. Node-1 is ptdmod01 and Node-2 is ptdmod02. It is having 218 ocfs file system, which are shared among both servers. Since this is ocfs2, each disk from EMC Storage is mounted individually on file-system as... (4 Replies)
Discussion started by: solaris_1977
4 Replies

4. Linux

How secure is Postfix/Saslauth2 on Linux?

How secure is Postfix/saslauth2 on Linux, I'm setting up this stuff as an email server, but concerned about security? Thanks (1 Reply)
Discussion started by: bubujake
1 Replies

5. UNIX for Dummies Questions & Answers

Just started linux any advice??

well i just got into this and really dont know anything so if anyone has any reccomendations like books/sites/forums/or just general advice or if anyone wants to help me get started i would really appreciate it thank you very much (6 Replies)
Discussion started by: Necrons
6 Replies

6. UNIX for Dummies Questions & Answers

Advice on UNIX/Linux

I have 6 extra hard drives and want to install them in my boxes and run UNIX, LINUX andyes M$ Winblows. How do I make it so i have the choice of which HD to boot from? Also, which UNIX distribution should i run to get aquainted with it, and wheres the best place to get it? Thank you very much if... (5 Replies)
Discussion started by: r1sk
5 Replies
Login or Register to Ask a Question
POSIX_MADVISE(3)					     Linux Programmer's Manual						  POSIX_MADVISE(3)

NAME
posix_madvise - give advice about patterns of memory usage SYNOPSIS
#include <sys/mman.h> int posix_madvise(void *addr, size_t len, int advice); Feature Test Macro Requirements for glibc (see feature_test_macros(7)): posix_madvise(): _POSIX_C_SOURCE >= 200112L DESCRIPTION
The posix_madvise() function allows an application to advise the system about its expected patterns of usage of memory in the address range starting at addr and continuing for len bytes. The system is free to use this advice in order to improve the performance of memory accesses (or to ignore the advice altogether), but calling posix_madvise() shall not affect the semantics of access to memory in the speci- fied range. The advice argument is one of the following: POSIX_MADV_NORMAL The application has no special advice regarding its memory usage patterns for the specified address range. This is the default behavior. POSIX_MADV_SEQUENTIAL The application expects to access the specified address range sequentially, running from lower addresses to higher addresses. Hence, pages in this region can be aggressively read ahead, and may be freed soon after they are accessed. POSIX_MADV_RANDOM The application expects to access the specified address range randomly. Thus, read ahead may be less useful than normally. POSIX_MADV_WILLNEED The application expects to access the specified address range in the near future. Thus, read ahead may be beneficial. POSIX_MADV_DONTNEED The application expects that it will not access the specified address range in the near future. RETURN VALUE
On success, posix_madvise() returns 0. On failure, it returns a positive error number. ERRORS
EINVAL addr is not a multiple of the system page size or len is negative. EINVAL advice is invalid. ENOMEM Addresses in the specified range are partially or completely outside the caller's address space. VERSIONS
Support for posix_madvise() first appeared in glibc version 2.2. CONFORMING TO
POSIX.1-2001. NOTES
POSIX.1 permits an implementation to generate an error if len is 0. On Linux, specifying len as 0 is permitted (as a successful no-op). In glibc, this function is implemented using madvise(2). However, since glibc 2.6, POSIX_MADV_DONTNEED is treated as a no-op, because the corresponding madvise(2) value, MADV_DONTNEED, has destructive semantics. SEE ALSO
madvise(2), posix_fadvise(2) COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2017-09-15 POSIX_MADVISE(3)