Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Thu 21 Aug 2014, 20:15
All times are UTC - 4
 Forum index » Advanced Topics » Puppy Projects » Documentation Project
Linux Security
Moderators: Flash, JohnMurga, puppian
Post new topic   Reply to topic View previous topic :: View next topic
Page 1 of 1 [1 Post]  
Author Message
Mic67

Joined: 30 Oct 2006
Posts: 478

PostPosted: Mon 29 Jan 2007, 19:09    Post subject:  Linux Security  

http://www.linuxtopia.org/LinuxSecurity/index.html
Table of Contents - Linux Security for Beginners

Mic67 Basic but worth the read

http://www.foogazi.com/2007/01/03/the-best-linux-security-tools/
The Best Linux Security Tools
January 3rd, 2007
"January 4th, 2007 at 7:42 am
Mrg Says:
Firestarter (http://www.fs-security.com/) it’s a great GTK firewall frontend, a must in linux security, IMHO"

http://www.linuxexposed.com/index.php?option=com_content&task=view&id=192&Itemid=1
"Google Tricks and hacks *UPDATED*

http://www.votelinux.com/
how running processes

Sunday December 24, 2006 - 16:01 by Headhunter
There are around half a dozen ways to show the number of running processes in Linux.
Here are some of them:

$ pstree # Show running processes in an hierachical tree
$ ps # Show running processes (without parameters for the currently open shell)
$ ps ax # Show detailled information about all processes
$ top # a textbased task manager (kind of)

The most important thing to read from these tools is the process id, a unique number assigned to each programm by Linux. Use the kill-command to terminate a process by it's id.


http://www.schneier.com/blog/archives/2005/01/linux_security.html

Schneier on Security
A weblog covering security and security technology.
They just released a report about the security of Linux:

http://www.schneier.com/book-sandl-intro2.html

http://www.schneier.com/essay-075.html
The Witty worm: A New Chapter in Malware

http://www.schneier.com/essay-085.html
Attack Trends: 2004 and 2005
"Over the past few months, the two attack vectors that we saw in volume were against the Windows DCOM (Distributed Component Object Model) interface of the RPC (remote procedure call) service and against the Windows LSASS (Local Security Authority Subsystem Service). These seem to be the current favorites for virus and worm writers, and we expect this trend to continue."

MIC67 comment. even though this was from 2005 I can say that these tech. were still in use (alongt a multitude of others), when I was using windows about 3 months ago.

http://www.schneier.com/essay-003.html
Click here to bring down the Internet

http://www.theregister.co.uk/2007/01/22/bill_cheswick_interview/
Net security from one of the fathers of the biz
Published Monday 22nd January 2007 12:28 GMT

http://www.theregister.co.uk/2007/01/18/google_patches_cookie_bugs/
Cookie monster menaces Google

http://www.puschitz.com/SecuringLinux.shtml
Detecting Listening Network Ports
One of the most important tasks is to detect and close network ports that are not needed.

MK67 Although red hat based an interesting read/////
///////////////////////////

http://www.gentoo.org/security/en/glsa/
MK 67 although gentoo linux based there may be some common apps. LIKE

http://www.gentoo.org/security/en/glsa/
multiple vulnerabilities fixed in seamonkey 1.0.6
http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
Title: Crashes with evidence of memory corruption (rv:1.8.0.Cool
Impact: Critical
Announced: November 7, 2006

////////////////////////////////

http://www.seifried.org/security/index.php/Linux_Security
Linux Security Techniques
##############################################
http://www.seifried.org/security/index.php/Linux_and_Viruses
"Linux is not as susceptible to viruses in the same ways that a Dos/Windows or Mac platform is. In UNIX, security controls are a fundamental part of the operating system. For example users are not allowed to write promiscuously to any location in memory that they choose to, something that Dos/Windows and the Mac allow."
#############################################
http://www.novell.com/linux/security/advisories.html
http://www.novell.com/linux/security/advisories.html
SUSE Security Announcement: mozilla (SUSE-SA:2007:006)

http://en.wikipedia.org/wiki/Linux_Security_Modules
http://en.wikipedia.org/wiki/SELinux


http://p3net.net/blog/2006/11/top-5-linux-on-laptop-myths-debunked.html
Top 5 Linux-on-Laptop Myths Debunked

http://www.psychocats.net/essays/linuxdesktopmyth
The Linux Desktop Myth
http://www.psychocats.net/essays/linuxtroll
Anatomy of a well-intentioned Linux Troll (or how I learned to stop worrying and love the penguin)

http://www.theregister.co.uk/2007/01/24/wga_audit/
One in five fail Windows validation checks
_______________________
"when your not the lead dog the view is always the same"
Back to top
View user's profile Send private message 
Display posts from previous:   Sort by:   
Page 1 of 1 [1 Post]  
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Advanced Topics » Puppy Projects » Documentation Project
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.0477s ][ Queries: 12 (0.0057s) ][ GZIP on ]