Linux Security

Helping keep Puppy well documented
Post Reply
Message
Author
Mic67

Linux Security

#1 Post by Mic67 »

http://www.linuxtopia.org/LinuxSecurity/index.html
Table of Contents - Linux Security for Beginners

Mic67 Basic but worth the read

http://www.foogazi.com/2007/01/03/the-b ... ity-tools/
The Best Linux Security Tools
January 3rd, 2007
"January 4th, 2007 at 7:42 am
Mrg Says:
Firestarter (http://www.fs-security.com/) it’s a great GTK firewall frontend, a must in linux security, IMHO"

http://www.linuxexposed.com/index.php?o ... 2&Itemid=1
"Google Tricks and hacks *UPDATED*

http://www.votelinux.com/
how running processes

Sunday December 24, 2006 - 16:01 by Headhunter
There are around half a dozen ways to show the number of running processes in Linux.
Here are some of them:

$ pstree # Show running processes in an hierachical tree
$ ps # Show running processes (without parameters for the currently open shell)
$ ps ax # Show detailled information about all processes
$ top # a textbased task manager (kind of)

The most important thing to read from these tools is the process id, a unique number assigned to each programm by Linux. Use the kill-command to terminate a process by it's id.


http://www.schneier.com/blog/archives/2 ... urity.html

Schneier on Security
A weblog covering security and security technology.
They just released a report about the security of Linux:

http://www.schneier.com/book-sandl-intro2.html

http://www.schneier.com/essay-075.html
The Witty worm: A New Chapter in Malware

http://www.schneier.com/essay-085.html
Attack Trends: 2004 and 2005
"Over the past few months, the two attack vectors that we saw in volume were against the Windows DCOM (Distributed Component Object Model) interface of the RPC (remote procedure call) service and against the Windows LSASS (Local Security Authority Subsystem Service). These seem to be the current favorites for virus and worm writers, and we expect this trend to continue."

MIC67 comment. even though this was from 2005 I can say that these tech. were still in use (alongt a multitude of others), when I was using windows about 3 months ago.

http://www.schneier.com/essay-003.html
Click here to bring down the Internet

http://www.theregister.co.uk/2007/01/22 ... interview/
Net security from one of the fathers of the biz
Published Monday 22nd January 2007 12:28 GMT

http://www.theregister.co.uk/2007/01/18 ... okie_bugs/
Cookie monster menaces Google

http://www.puschitz.com/SecuringLinux.shtml
Detecting Listening Network Ports
One of the most important tasks is to detect and close network ports that are not needed.

MK67 Although red hat based an interesting read/////
///////////////////////////

http://www.gentoo.org/security/en/glsa/
MK 67 although gentoo linux based there may be some common apps. LIKE

http://www.gentoo.org/security/en/glsa/
multiple vulnerabilities fixed in seamonkey 1.0.6
http://www.mozilla.org/security/announc ... 06-65.html
Title: Crashes with evidence of memory corruption (rv:1.8.0.8)
Impact: Critical
Announced: November 7, 2006

////////////////////////////////

http://www.seifried.org/security/index. ... x_Security
Linux Security Techniques
##############################################
http://www.seifried.org/security/index. ... nd_Viruses
"Linux is not as susceptible to viruses in the same ways that a Dos/Windows or Mac platform is. In UNIX, security controls are a fundamental part of the operating system. For example users are not allowed to write promiscuously to any location in memory that they choose to, something that Dos/Windows and the Mac allow."
#############################################
http://www.novell.com/linux/security/advisories.html
http://www.novell.com/linux/security/advisories.html
SUSE Security Announcement: mozilla (SUSE-SA:2007:006)

http://en.wikipedia.org/wiki/Linux_Security_Modules
http://en.wikipedia.org/wiki/SELinux


http://p3net.net/blog/2006/11/top-5-lin ... unked.html
Top 5 Linux-on-Laptop Myths Debunked

http://www.psychocats.net/essays/linuxdesktopmyth
The Linux Desktop Myth
http://www.psychocats.net/essays/linuxtroll
Anatomy of a well-intentioned Linux Troll (or how I learned to stop worrying and love the penguin)

http://www.theregister.co.uk/2007/01/24/wga_audit/
One in five fail Windows validation checks
_______________________
"when your not the lead dog the view is always the same"

Post Reply