Find the answer to your Linux question:
Page 20 of 80 FirstFirst ... 10 16 17 18 19 20 21 22 23 24 30 70 ... LastLast
Threads 381 to 400 of 1596

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at linuxforums.org we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 49,304
    01-11-2010 Go to last post
  2.  
  1. is this iptables script ok for production

    I just wanna consult iptables guru if my script was enough and secured for a production. The iptables will be use for a web server and with 2 private...

    Started by packets, 06-22-2010
    • Replies: 1
    • Views: 1,646
    06-23-2010 Go to last post
  2. Strange things one finds in logs

    Often I ignore the strange things in my logs, as I've found it is just part of the background noise of the internet. I'm quite used to getting...

    Started by Freston, 06-12-2010
    • Replies: 2
    • Views: 602
    06-15-2010 Go to last post
  3. Running programs under root with suid bit

    Hello, i've got a minimal test case with a C program with the following code #include <stdio.h> int main(){ printf("uid = %d",...

    Started by Richard_Xeli, 06-08-2010
    • Replies: 2
    • Views: 1,798
    06-15-2010 Go to last post
  4. How to use SSH(Secure Shell) Service in linux?

    Hi all I want to learn using SSH (Secure Shell) service in linux and connect to SSH server with PuTTY to test some commands, but I have not...

    Started by jeremy28, 06-11-2010
    • Replies: 1
    • Views: 619
    06-11-2010 Go to last post
  5. About remote access

    Hi folks, Most the time I run OpenSSH/SSH taking control of a remote Linux/Unix PC for administration via Internet/Public IP. Now I need taking...

    Started by satimis, 06-10-2010
    • Replies: 1
    • Views: 430
    06-10-2010 Go to last post
  6. find wrong permissions

    Hey I want to quickly check my system for badly configured permissions So I did this: find /etc/ -perm **6 But it didn't work at all.. so I...

    Started by RobinVossen, 05-08-2010
    • Replies: 4
    • Views: 2,088
    06-10-2010 Go to last post
  7. Wipe first and last megabyte of file

    I need some kind of tool to overwrite the first and last megabyte of a file several times. I was thinking about using dd in a script, but I'm not so...

    Started by lladlu, 06-09-2010
    • Replies: 1
    • Views: 528
    06-09-2010 Go to last post
  8. Preserving Source MAC on Gateway Machine

    How can I preserve the source MAC address on a gateway machine before forwarding data it through another eth. For example I have eth1 and eth2...

    Started by abhinavp, 06-09-2010
    • Replies: 0
    • Views: 478
    06-09-2010 Go to last post
  9. ssh port configuration

    I am trying to configure my ssh port from 22 to some non standard port no. availabe information on net suggests to change settings in...

    Started by ssh_123, 06-07-2010
    • Replies: 4
    • Views: 2,086
    06-08-2010 Go to last post
  10. Linux Auditd / filtering by user & sudo su -

    Hello, I would like to configure auditd to only log events issued by some users acting as root after a 'sudo su -' Unfortunately, after the...

    Started by flatplane, 05-27-2010
    • Replies: 8
    • Views: 3,656
    06-04-2010 Go to last post
  11. Multiple encrypted containers of the same data, is it a risk for forcing decry

    Does having multiple encrypted contrainers of the same data present an oppurtunity to analyze the external container and get access to the contents?...

    Started by imagenesis, 05-05-2010
    • Replies: 1
    • Views: 500
    05-27-2010 Go to last post
  12. User tripping port flood rules in csf

    This one isn't so much about how to protect a server, but rather why a specific user is tripping the port flood rule. I use csf on the server, and...

    Started by retired1af, 05-21-2010
    • Replies: 4
    • Views: 2,347
    05-23-2010 Go to last post
  13. Question File permissions - "root concern" - encryption?

    I'm at an institution with many users and a few system administrators on a network of mainly linux and a few unix machines. I have a two-part...

    Started by phaseshift, 05-20-2010
    • Replies: 1
    • Views: 500
    05-21-2010 Go to last post
  14. Virus Free LInux

    hello I have listened that linux is virus free.Is that true? If yes then whats is the reason behind this??

    Started by vndpundir2007, 05-17-2010
    4 Pages
    1 2 3 ... 4
    • Replies: 31
    • Views: 4,137
    05-20-2010 Go to last post
  15. Number of login attempts in linux

    Hello Experts I have a question.... How do we restrict number of login attempts in Linux ??? Let me explain :-- In windows NT we have an...

    Started by sunilk, 02-14-2003
    • Replies: 3
    • Views: 11,891
    05-19-2010 Go to last post
  16. Question Closing / Blocking Ports with IPTABLES

    Hello, I'm new on this forum. And I'm pretty new to Linux as well. I was hoping that someone could either show me or point me in the general...

    Started by Drunch, 05-14-2010
    • Replies: 6
    • Views: 2,609
    05-18-2010 Go to last post
  17. Red face [SOLVED] Security

    Is it necessary to have an antispy and/or an antivarus programme on open suse. If so, can someone recommend one they have been using.

    Started by leilton, 05-17-2010
    • Replies: 3
    • Views: 502
    05-18-2010 Go to last post
  18. Block bittorrent download

    Hello all, I want to block bittorrent download through my gateway server. eth1-------------- local eth0------------- internet Running FC2 Pls...

    Started by sakimustafa, 08-20-2006
    • Replies: 5
    • Views: 21,202
    05-17-2010 Go to last post
  19. Question ssh keygen; asking for password

    I am setting up a server so "userA" is using keys from "serverA" to access "serverB, userB". I created keys using "ssh-keygen -t rsa -f id_rsa" ...

    Started by mjc, 08-03-2007
    2 Pages
    1 2
    • Replies: 14
    • Views: 20,148
    05-12-2010 Go to last post
  20. Question Force sshd to default to Protocol 1

    Is there any way to force a ssh server accept connections using V1 as default? I recently changed my sshd_config to allow Protocol 1,2 and now all...

    Started by kosie99, 05-05-2010
    • Replies: 4
    • Views: 1,504
    05-07-2010 Go to last post

Page 20 of 80 FirstFirst ... 10 16 17 18 19 20 21 22 23 24 30 70 ... LastLast

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •