Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for NSA Publically-Released Solaris 8 Security Guide

Solaris

Enforcing a Two Man Rule Using Solaris 10 RBAC

Post date: April 28, 2005, 02:04 Category: Security Views: 4530 Comments
Tutorial quote: The "two man rule" (also sometimes called the "four eyes rule") has its origins in military protocol although for quite some time it has been welcomed into the stockpile of IT security controls used by organizations around the world. The "two man rule" specifies that there must be two individuals that must act in concert in order to perform some action.
OpenBSD

Apache - Serving up the Web

Post date: April 11, 2006, 22:04 Category: Network Views: 7322 Comments
Tutorial quote: The Apache Web Server is installed as part of the OpenBSD base system. This guide will help you configure the web server: (Apache 1.3.12 is released with OpenBSD 2.7 and 1.3.9 with OpenBSD 2.6)

To see how configurable the Apache/OpenBSD combination is we also look at allowing administrators to remotely review the server's status, we setup the system so we allow users on our system to have their own personal web-space. Of course, for the security counscious you probably want to turn some of these things off after you get things up and running.
Debian

Securing Debian Manual

Post date: January 1, 2008, 13:01 Category: Security Views: 3680 Comments
Tutorial quote: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
Linux

Hardening Linux: a 10 step approach to a secure server

Post date: June 22, 2005, 10:06 Category: Security Views: 3529 Comments
Tutorial quote: The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.

This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.
CentOS

Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)

Post date: June 25, 2007, 23:06 Category: Installing Views: 4347 Comments
Tutorial quote: The intent of this article is to show you how to configure your Linux machine and Samba server to participate in a Windows 2003 Active Directory domain as a Member Server using Kerberos authentication. This involves using the security = ADS security mode in Samba.
Linux

Enhancing kernel security with grsecurity

Post date: November 25, 2005, 21:11 Category: Security Views: 2875 Comments
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.
Unix+clones

Comparing MySQL performance

Post date: April 12, 2005, 07:04 Category: Benchmarks Views: 3425 Comments
Tutorial quote: With the introduction of the 2.6 Linux kernel, FreeBSD-5-STABLE, Solaris 10, and now NetBSD 2.0, you might be wondering which of them offers superior database performance. In my previous article, I discussed the tools I chose to test these venerable operating systems and the methodology by which they were tested. The result is this MySQL performance comparison between OpenBSD 3.6; NetBSD 2.0; FreeBSD 5.3 and 4.10; Solaris Express (build 69); and Linux 2.4 and 2.6 (Gentoo-based). Read on for the results.
Solaris

Configuring the Behavior of the Solaris IP Filter Firewall

Post date: April 20, 2007, 18:04 Category: Network Views: 9114 Comments
Tutorial quote: When defining packet filtering rules in the /etc/ipf/ipf.conf file, it is necessary to understand how the Solaris IP Filter firewall reads this file and compares any packet against the rules in the file.
Solaris

Set up a multipurpose Solaris web server

Post date: January 26, 2007, 07:01 Category: Miscellaneous Views: 9179 Comments
Tutorial quote: This HOWTO explains how to set up a multipurpose Solaris web server.
Solaris

PCP script to find open TCP ports and PIDs related in Solaris

Post date: May 13, 2009, 22:05 Category: Network Views: 7612 Comments
Tutorial quote: PCP is a very useful security and adminitration script that can help you quickly find Processes (PIDs) having particular TCP Port(s) open, TCP ports open by specific PIDs or even list all the TCP Ports open by all PIDs running on your system.
Web-based applications and online marketing solutions - LumoLink