Find the answer to your Linux question:
Page 21 of 82 FirstFirst ... 11 17 18 19 20 21 22 23 24 25 31 71 ... LastLast
Threads 401 to 420 of 1625

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at linuxforums.org we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 50,874
    01-11-2010 Go to last post
  2.  
  1. Question about files in /tmp folder

    In my /tmp folder, i have two items which are locked: orbit-gdm pulse-PKdhtXMmr18n Is this normal/safe? If not, is it safe to delete these?

    Started by Ocifer, 07-18-2010
    • Replies: 1
    • Views: 6,917
    07-18-2010 Go to last post
  2. Paranoia

    Ok, so one day My machine went crazy. The mail server stopped working, and I had to completely re-install it and it took forever. So I was...

    Started by xilus, 07-07-2010
    • Replies: 4
    • Views: 842
    07-17-2010 Go to last post
  3. Question problem with script

    Hi every one I have started to deal with Linux from nearly time I have network can prevent any one to log in if he/she don't register the MAC...

    Started by blaly, 07-11-2010
    • Replies: 3
    • Views: 666
    07-15-2010 Go to last post
  4. Question are linux have virus?

    hi all are os linux can be infect with virus or Trojan? please any information help me regard vip

    Started by vipser, 07-10-2010
    • Replies: 4
    • Views: 839
    oz
    07-13-2010 Go to last post
  5. Openssh: renaming keys

    am using openSSH on Debian Lenny. For years now I've used ssh key create by using ssh-keygen -t rsa It offers the default name of id_rsa...

    Started by bill-linux, 06-25-2010
    • Replies: 2
    • Views: 2,709
    07-08-2010 Go to last post
  6. auditctl - man page confusion

    Am I having a senior moment or is this just confusing: The auditctl man page (RHEL 4) states: success If the exit value is >= 0 this is...

    Started by matonb, 06-16-2010
    • Replies: 2
    • Views: 1,962
    07-06-2010 Go to last post
  7. Virus Migration Across Partitions

    I run a laptop with Windows 7 (64-bit). Sometimes I boot Linux from an image on CD. So basically the Linux OS runs temporarily in the ram (so on...

    Started by Comphelp144, 07-05-2010
    • Replies: 2
    • Views: 1,307
    07-06-2010 Go to last post
  8. Vulnerability list of Linux web browsers ??

    Hi , I am working on network security and working on Host Intrusion Detection System . I am looking for sites which contains the latest...

    Started by LInsec, 06-22-2010
    • Replies: 3
    • Views: 1,452
    06-25-2010 Go to last post
  9. How to detect auto dialers

    Hi, What are the possible ways to detect auto dialers ,which make calls without users consent, in linux. Is it possible to disable dialing...

    Started by chamalsl, 06-24-2010
    • Replies: 1
    • Views: 1,114
    06-24-2010 Go to last post
  10. is this iptables script ok for production

    I just wanna consult iptables guru if my script was enough and secured for a production. The iptables will be use for a web server and with 2 private...

    Started by packets, 06-22-2010
    • Replies: 1
    • Views: 1,731
    06-23-2010 Go to last post
  11. Strange things one finds in logs

    Often I ignore the strange things in my logs, as I've found it is just part of the background noise of the internet. I'm quite used to getting...

    Started by Freston, 06-12-2010
    • Replies: 2
    • Views: 645
    06-15-2010 Go to last post
  12. Running programs under root with suid bit

    Hello, i've got a minimal test case with a C program with the following code #include <stdio.h> int main(){ printf("uid = %d",...

    Started by Richard_Xeli, 06-08-2010
    • Replies: 2
    • Views: 1,849
    06-15-2010 Go to last post
  13. How to use SSH(Secure Shell) Service in linux?

    Hi all I want to learn using SSH (Secure Shell) service in linux and connect to SSH server with PuTTY to test some commands, but I have not...

    Started by jeremy28, 06-11-2010
    • Replies: 1
    • Views: 646
    06-11-2010 Go to last post
  14. About remote access

    Hi folks, Most the time I run OpenSSH/SSH taking control of a remote Linux/Unix PC for administration via Internet/Public IP. Now I need taking...

    Started by satimis, 06-10-2010
    • Replies: 1
    • Views: 463
    06-10-2010 Go to last post
  15. find wrong permissions

    Hey I want to quickly check my system for badly configured permissions So I did this: find /etc/ -perm **6 But it didn't work at all.. so I...

    Started by RobinVossen, 05-08-2010
    • Replies: 4
    • Views: 2,216
    06-10-2010 Go to last post
  16. Wipe first and last megabyte of file

    I need some kind of tool to overwrite the first and last megabyte of a file several times. I was thinking about using dd in a script, but I'm not so...

    Started by lladlu, 06-09-2010
    • Replies: 1
    • Views: 547
    06-09-2010 Go to last post
  17. Preserving Source MAC on Gateway Machine

    How can I preserve the source MAC address on a gateway machine before forwarding data it through another eth. For example I have eth1 and eth2...

    Started by abhinavp, 06-09-2010
    • Replies: 0
    • Views: 508
    06-09-2010 Go to last post
  18. ssh port configuration

    I am trying to configure my ssh port from 22 to some non standard port no. availabe information on net suggests to change settings in...

    Started by ssh_123, 06-07-2010
    • Replies: 4
    • Views: 2,136
    06-08-2010 Go to last post
  19. Linux Auditd / filtering by user & sudo su -

    Hello, I would like to configure auditd to only log events issued by some users acting as root after a 'sudo su -' Unfortunately, after the...

    Started by flatplane, 05-27-2010
    • Replies: 8
    • Views: 3,796
    06-04-2010 Go to last post
  20. Multiple encrypted containers of the same data, is it a risk for forcing decry

    Does having multiple encrypted contrainers of the same data present an oppurtunity to analyze the external container and get access to the contents?...

    Started by imagenesis, 05-05-2010
    • Replies: 1
    • Views: 526
    05-27-2010 Go to last post

Page 21 of 82 FirstFirst ... 11 17 18 19 20 21 22 23 24 25 31 71 ... LastLast

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •