Tips
Tips
Alternative operating system security
-
MacIntosh vs. Windows: Choosing to take a bite of the Apple
Disgusted by security and performance issues, Winn Schwartau switches from Windows to Mac and details the bumps along the way in this exclusive intro to his Mad as Hell series. Continue Reading
-
Mad as Hell: I -- Switching to Mac
Winn Schwartau switches from Windows to Mac and tells why. Continue Reading
-
Mad as Hell III -- Month 1 review
Winn Schwartau sums up his first experiences in his conversion from Windows to Mac. Continue Reading
-
Desktop Summit '05: How to hit up the enterprise
A self-described Novell "marketing wonk" provides tips for getting your company to adopt Linux desktops. For starters, don't hype. Continue Reading
-
Week 44: Permissions, part 2 -- Who owns what when?
Attackers can gain access to your system through files, directories and devices with higher privileges than necessary that execute on behalf of a privileged task. Continue Reading
-
Week 43: Permissions -- How world-writeable are you?
Files, directories and devices that can be modified by any user are known as "world–writable" and are dangerous security holes. Continue Reading
-
Battle of the OSes: Which is most secure?
Ira Winkler answers the age-old security question: Which operating system is most secure? Continue Reading
-
Secure Architectures with OpenBSD: Chapter 3 -- Installation
Find out more about installing OpenBSD on your network. Continue Reading
-
Wishful thinking
Should Linux users brush off concerns about malware plagues? Short answer: No. Continue Reading
-
OS Hardening and Other Essential Linux Skills for Maintaining Security
Jay Beales outlines must-have Linux skills for administrators. Continue Reading
-
Operating Systems and Cisco Security Applications
This chapter reviews two of today's most common end user applications, Unix and Windows NT systems. Cisco security applications are also covered. Continue Reading
-
The 'Swiss Army Knife' security tool
The LiSt Open Files command is like a Swiss Army Knife: It has a variety of uses -- for security or utility -- and fits easily in your pocket. Continue Reading
-
Track the shell history of specific users
Keep track of the shell history of specific users. Continue Reading
-
Separate root history files
With the code below put in a kshrc file, each admin that su's into root will have their own root's history file. Continue Reading
-
Rootshell parachute
Create a setuid shell (mode 4755) of your favorite Unix shell owned by root. Continue Reading