Find the answer to your Linux question:
Page 26 of 86 FirstFirst ... 16 22 23 24 25 26 27 28 29 30 36 76 ... LastLast
Threads 501 to 520 of 1707

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at linuxforums.org we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 66,518
    01-11-2010 Go to last post
  2.  
  1. ssh port configuration

    I am trying to configure my ssh port from 22 to some non standard port no. availabe information on net suggests to change settings in...

    Started by ssh_123, 06-07-2010
    • Replies: 4
    • Views: 2,606
    06-08-2010 Go to last post
  2. Linux Auditd / filtering by user & sudo su -

    Hello, I would like to configure auditd to only log events issued by some users acting as root after a 'sudo su -' Unfortunately, after the...

    Started by flatplane, 05-27-2010
    • Replies: 8
    • Views: 4,608
    06-04-2010 Go to last post
  3. Multiple encrypted containers of the same data, is it a risk for forcing decry

    Does having multiple encrypted contrainers of the same data present an oppurtunity to analyze the external container and get access to the contents?...

    Started by imagenesis, 05-05-2010
    • Replies: 1
    • Views: 712
    05-27-2010 Go to last post
  4. User tripping port flood rules in csf

    This one isn't so much about how to protect a server, but rather why a specific user is tripping the port flood rule. I use csf on the server, and...

    Started by retired1af, 05-21-2010
    • Replies: 4
    • Views: 2,822
    05-23-2010 Go to last post
  5. Question File permissions - "root concern" - encryption?

    I'm at an institution with many users and a few system administrators on a network of mainly linux and a few unix machines. I have a two-part...

    Started by phaseshift, 05-20-2010
    • Replies: 1
    • Views: 750
    05-21-2010 Go to last post
  6. Virus Free LInux

    hello I have listened that linux is virus free.Is that true? If yes then whats is the reason behind this??

    Started by vndpundir2007, 05-17-2010
    4 Pages
    1 2 3 ... 4
    • Replies: 31
    • Views: 5,300
    05-20-2010 Go to last post
  7. Number of login attempts in linux

    Hello Experts I have a question.... How do we restrict number of login attempts in Linux ??? Let me explain :-- In windows NT we have an...

    Started by sunilk, 02-14-2003
    • Replies: 3
    • Views: 14,806
    05-19-2010 Go to last post
  8. Question Closing / Blocking Ports with IPTABLES

    Hello, I'm new on this forum. And I'm pretty new to Linux as well. I was hoping that someone could either show me or point me in the general...

    Started by Drunch, 05-14-2010
    • Replies: 6
    • Views: 3,409
    05-18-2010 Go to last post
  9. Red face [SOLVED] Security

    Is it necessary to have an antispy and/or an antivarus programme on open suse. If so, can someone recommend one they have been using.

    Started by leilton, 05-17-2010
    • Replies: 3
    • Views: 783
    05-18-2010 Go to last post
  10. Block bittorrent download

    Hello all, I want to block bittorrent download through my gateway server. eth1-------------- local eth0------------- internet Running FC2 Pls...

    Started by sakimustafa, 08-20-2006
    • Replies: 5
    • Views: 22,147
    05-17-2010 Go to last post
  11. Question ssh keygen; asking for password

    I am setting up a server so "userA" is using keys from "serverA" to access "serverB, userB". I created keys using "ssh-keygen -t rsa -f id_rsa" ...

    Started by mjc, 08-03-2007
    2 Pages
    1 2
    • Replies: 14
    • Views: 22,093
    05-12-2010 Go to last post
  12. Question Force sshd to default to Protocol 1

    Is there any way to force a ssh server accept connections using V1 as default? I recently changed my sshd_config to allow Protocol 1,2 and now all...

    Started by kosie99, 05-05-2010
    • Replies: 4
    • Views: 1,952
    05-07-2010 Go to last post
  13. [SOLVED] Allert !!! Is my linux under attack?

    This morning I installed a new Linux O/S. Using Firefox, I was browsing a few sites I use to see. Soon one window opened, saying my system was under...

    Started by wilifo, 05-03-2010
    • Replies: 9
    • Views: 1,252
    05-05-2010 Go to last post
  14. Dealing with abuse from huge range of IPs

    Well, I messed up configuring a proxy on apache, and now I'm finding myself the target of a lot of nefarious people trying to use it as a proxy to...

    Started by SagaciousKJB, 04-29-2010
    • Replies: 5
    • Views: 974
    05-04-2010 Go to last post
  15. Logging/Blocking LAN traffic

    Hello, Where I work we have a lan, it is almost 100% windows machines except for 2 CentOS machines in which some clients connect to, via VPN....

    Started by nothing_pt, 04-26-2010
    • Replies: 2
    • Views: 949
    04-27-2010 Go to last post
  16. firewalls, anti-virus and spyware

    Hi. I've just started using Linux a couple of days ago when my windowsXP restore disk for my laptop wouldn't work, so I decided to try Ubuntu...

    Started by peteuplink, 02-26-2010
    • Replies: 7
    • Views: 3,848
    04-21-2010 Go to last post
  17. Question The big "open source" question

    Hi, I'm using GNU/Linux since 2004 because it helped me having a good sleep. Ok. It is much easier to maintain than Windows was (and is still)....

    Started by BrandNewColony, 04-05-2010
    • Replies: 3
    • Views: 1,002
    04-20-2010 Go to last post
  18. Port Scanner for Linux

    i have heard that linux (redhat 8.0) has a built in port scanner, is this true ? if so, how can i access it and scan localhost to see what ports i...

    Started by danbo, 02-09-2003
    • Replies: 5
    • Views: 94,276
    04-19-2010 Go to last post
  19. Look like a virus or ddos attack not sure, please help

    Hello, I view my /var/log/maillog and see tons of lines like this: Apr 14 01:35:16 ns1 postfix/qmgr: AB33922B89D8: to=<gwrp@yahoo.com.tw>,...

    Started by moimel, 04-13-2010
    • Replies: 1
    • Views: 2,918
    04-18-2010 Go to last post
  20. Is GPG my best method of signing files?

    I'm working on large testing/simulation system that, amongst other responsibilities, must capture live data for later playback. We are looking at...

    Started by sollen, 04-14-2010
    • Replies: 1
    • Views: 1,400
    04-15-2010 Go to last post

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •