20 Linux Server Hardening Security Tips - NixCraft
20 Linux Server Hardening Security Tips - NixCraft
20 Linux Server Hardening Security Tips - NixCraft
About
Contact us
Forums
Home
Linux How-to & Tutorials
Shell Scripts
RSS/Feed
nixCraft
OR
# dpkg --list
# dpkg --info packageName
# apt-get remove packageName
1/28
10/29/2014
Run different network services on separate servers or VM instance. This limits the number of other services that can be compromised. For
example, if an attacker able to successfully exploit a software such as Apache flow, he / she will get an access to entire server including
other services such as MySQL, e-mail server and so on. See how to install Virtualization software:
Install and Setup XEN Virtualization Software on CentOS Linux 5
How To Setup OpenVZ under RHEL / CentOS Linux
OR
# apt-get update && apt-get upgrade
You can configure Red hat / CentOS / Fedora Linux to send yum package update notification via email. Another option is to apply all
security updates via a cron job. Under Debian / Ubuntu Linux you can use apticron to send security notifications.
#5.1: SELinux
I strongly recommend using SELinux which provides a flexible Mandatory Access Control (MAC). Under standard Linux Discretionary
Access Control (DAC), an application or process running as a user (UID or SUID) has the user's permissions to objects such as files,
sockets, and other processes. Running a MAC kernel protects the system from malicious or flawed applications that can damage or destroy
the system. See the official Redhat documentation which explains SELinux configuration.
Finally, you can also edit the /etc/shadow file in the following fields:
{userName}:{password}:{lastpasswdchanged}:{Minimum_days}:{Maximum_days}:{Warn}:{Inactive}:{Expire}:
Where,
1. Minimum_days: The minimum number of days required between password changes i.e. the number of days left before the user is
allowed to change his/her password.
2. Maximum_days: The maximum number of days the password is valid (after that user is forced to change his/her password).
3. Warn : The number of days before password is to expire that user is warned that his/her password must be changed.
4. Expire : Days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used.
I recommend chage command instead of editing the /etc/shadow by hand:
# chage -M 60 -m 7 -W 7 userName
Recommend readings:
Linux: Force Users To Change Their Passwords Upon First Login
Linux turn On / Off password expiration / aging
Lock the user password
http://www.cyberciti.biz/tips/linux-security.html
2/28
10/29/2014
Note you can use passwd command to lock and unlock accounts:
# lock account
passwd -l userName
# unlocak account
passwd -u userName
If you see other lines, delete them or make sure other accounts are authorized by you to use UID 0.
3/28
10/29/2014
Use the following command to list all open ports and associated programs:
netstat -tulpn
OR
nmap -sT -O localhost
nmap -sT -O server.example.com
Use iptables to close open ports or stop all unwanted network services using above service and chkconfig commands.
#9.2: See Also
update-rc.d like command on Redhat Enterprise / CentOS Linux.
Ubuntu / Debian Linux: Services Configuration Tool to Start / Stop System Services.
Get Detailed Information About Particular IP address Connections Using netstat Command.
4/28
10/29/2014
Sample /etc/fstab entry to to limit user access on /dev/sda5 (ftp server root directory):
/dev/sda5
/ftpdata
ext3
defaults,nosuid,nodev,noexec 1 2
You need to investigate each reported file. See reported file man page for further details.
You need to investigate each reported file and either set correct user and group permission or remove it.
You need to investigate each reported file and either assign it to an appropriate user and group or remove it.
#16.1: Kerberos
Kerberos performs authentication as a trusted third party authentication service by using cryptographic shared secret under the assumption
http://www.cyberciti.biz/tips/linux-security.html
5/28
10/29/2014
that packets traveling along the insecure network can be read, modified, and inserted. Kerberos builds on symmetric-key cryptography and
requires a key distribution center. You can make remote login, remote copy, secure inter-system file copying and other high-risk tasks safer
and more controllable using Kerberos. So, when users authenticate to network services using Kerberos, unauthorized users attempting to
gather passwords by monitoring network traffic are effectively thwarted. See how to setup and use Kerberos.
http://www.cyberciti.biz/tips/linux-security.html
6/28
10/29/2014
Other Recommendation:
Backups - It cannot be stressed enough how important it is to make a backup of your Linux system. A proper offsite backup allows
you to recover from cracked server i.e. an intrusion. The traditional UNIX backup programs are dump and restore are also
recommended.
How to: Looking for Rootkits on Linux based server.
Howto: Enable ExecShield Buffer Overflows Protection on Linux based server.
Subscribe to Redhat or Debian Linux security mailing list or RSS feed.
Recommend readings:
1.
2.
3.
4.
7/28
10/29/2014
In the next part of this series I will discuss how to secure specific applications (such as Proxy, Mail, LAMP, Database) and a few other
security tools. Did I miss something? Please add your favorite system security tool or tip in the comments.
TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!
Featured Articles:
30 Cool Open Source Software I Discovered in 2013
30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X
Top 30 Nmap Command Examples For Sys/Network Admins
25 PHP Security Best Practices For Sys Admins
20 Linux System Monitoring Tools Every SysAdmin Should Know
20 Linux Server Hardening Security Tips
Linux: 20 Iptables Examples For New SysAdmins
Top 20 OpenSSH Server Best Security Practices
Top 20 Nginx WebServer Best Security Practices
20 Examples: Make Sure Unix / Linux Configuration Files Are Free From Syntax Errors
15 Greatest Open Source Terminal Applications Of 2012
My 10 UNIX Command Line Mistakes
Top 10 Open Source Web-Based Project Management Software
Top 5 Email Client For Linux, Mac OS X, and Windows Users
The Novice Guide To Buying A Linux Laptop
8/28
10/29/2014
9/28
10/29/2014
10/28
10/29/2014
11/28
10/29/2014
12/28
10/29/2014
Reply
41 snappy November 7, 2009 at 10:40 pm
Most of these tips are pretty much ubiquitous. Secure passwords (e.g. those found outside of hacker dictionaries), and mod_security
or something similar for your webserver are truly key. When confronted with a linux/UNIX machine, hackers will first try to
penetrate among common username/passwords and scan for vulnerabilities in common web applications. Prevent it before it occurs.
If you can, setup public-key auth for all SSH related crap. If youre using lighttpd, look for mod_security like rules.
Anyways, one cannot implement all since each environment is different. Also surprised to not see a file intrusion detection system up.
Also, securing your machine isnt enough, you want to keep at least daily backups. If you host your server and become a victim of
being hacked. Dont expect it to stop there, they will use your machine as a zombie/bot to attack other machines. The ISP will shut
your machine down, and you will have even a difficult time getting back to your data. Make backups frequently and off-site. Data is
truly of value, the machine it runs on isnt.
Just my 2c.
Reply
42 Espen November 9, 2009 at 11:37 am
Thanks for a great post.
Reply
43 Denis November 19, 2009 at 12:27 pm
OVZkernel RHEL
[root@server etc]# sysctl -p
..
error: net.ipv4.icmp_ignore_bogus_error_messages is an unknown key
13/28
10/29/2014
14/28
10/29/2014
Reply
60 bharath May 25, 2010 at 11:14 pm
really gud info..Thanxz to the postings
Reply
61 vanni linux June 9, 2010 at 10:11 am
Thanks for giving this
TuxRacer
Reply
62 Abdullah June 16, 2010 at 7:21 am
I would choose to install grsecurity:http://grsecurity.net/download.php linux kernel patch anytime over SELinux
because it have much more paranoid-security options that would make SElinux look like a baby toy,
Reply
63 a_m_y June 17, 2010 at 2:50 pm
Cool! It will help a lot, especially to novice linux users that will make them look expert, as well as for newbies. Thanks so much!!
More power!
Reply
64 edvard June 21, 2010 at 3:54 pm
Excellent article, however with the need for IPv6 fast approaching, telling users to disable it is like telling us to bury our heads in the
sand.
Ive seen this advice all over the internet, and it will very soon be not such a good idea.
I would suggest that instead of telling users to disable IPv6, lets start learning about it, creating tools to deal with it and get our hands
dirty using it.
Reply
65 Dave June 30, 2010 at 11:05 pm
@Ruben. Even if you only can access SSH from your lan, you should still disable root login. Just login using your own SSH key and
become root (su). Also limit the users that can become root (wheel users). So before someone can login root, he (or she) first have to
crack two user accounts. But disable root login helps also with the physical security.
About some other points. Passwords should not expire if you enforce strong passwords. The trouble is that users can only remember
only so many passwords, so if thay have to change password frequently, theyre gonna use the same password at other places.
In 2002 I had to strengthen the security for an e-commerce company. They kept the clear customer passwords in a database. You
wouldnt believe how many email logins and passwords work. BTW: Passwords should be stored as hashes. Sending an email with a
link to change the password is not different from a email that shows you the passwords. However, a comprised database is dangerous.
If I wanted it to, I could have read a lot of emails and collect even more sensitive data like registration mails from websites that show
you your password..
SE-Linux should be a standard installed with every Linux distribution. It makes it a bit harder to exploits bugs in code. Thats also
valuable on workstations. Most companies only secure the front door. If you break a window, you can go anywhere in the building.
Hack a workstation and often you can access everything within the LAN.
IPv6 should be disabled if you dont have an IPv6 IP or services. If you have, you have to secure just like you secure an IPv4
network. I already use IPv6 within every LAN I install. The main router (gateway) has an IPv6 bridge to my data center (which is
IPv6 enabled) and from there they can connect to both IPv6 networks or IPv4 networks.
Reply
66 norg July 20, 2010 at 10:34 am
There is a slight wording mistake in #1: Encrypt Data Communication, section 3 Fugu is a graphical frontend to the commandline
Secure File Transfer application (SFTP). The acronym SFTP is misleading. SFTP is the SSH file transfer protocol, Secure FTP
is something very different (http://en.wikipedia.org/wiki/FTP_over_SSH#FTP_over_SSH_.28not_SFTP.29). Secure FTP encrypts
only the control channel , the data channel stays unencrypted.
http://www.cyberciti.biz/tips/linux-security.html
15/28
10/29/2014
Reply
67 Charlie Brown July 23, 2010 at 2:55 am
SFTP is not the SSH file transfer Whuuat??
SFTP is a UTILITY that RUNS on SSH
Two different animals dude.. Authur had it right..
It kills me how many people get their info facts from wiki
Man.. doesnt anyone watch CNN? wiki is poo.. not accurate.. it is user-defined.. users make mistakes SFTP is NOT SSH
Agghhh!! (Charlie Brown Scream)
Reply
68 A G33k July 23, 2010 at 2:43 am
ANswer.. Get rid of the end user and hire someone who can remember a password..
Best practice is 60 or 90 day, 14 characters minimum, and complexity requiring minimum of 1 upper, 1 lower, 1 alpha, 1 symbol, 1
numeric.
Remember password history..
Is it convienent? No DO passwords get weaker with time? YEs..
Why because exploits move forward every day as do caps.. Each day a password remains static, is one more oppertunity given to
comprimise your system security and capture user information
The problem w/ user passwords is that SO many users, use bank info, pins, etc
Its a best practice As yourself this.. If you are sued.. yes.. lawsuit.. What will you tell the prosecuting atty. when he asks if you used
complexity requirements and changes on passwords?
All the attorney of the guy suing you has to prove is negligence.. Because so many passwords have been compromised.. you not
enforcing it could be cionsidered negligence and could be a fatal loss to the suit..
Not saying it is right or easy.. But its best practice and it will help keep you and your company (did I mention you) out of a bind if
legal issues arise
Reply
69 Navneet Gaur August 13, 2010 at 11:46 am
Really a very good and concise article that is informative and addresses various security issues.
Very well written.
Thank you for writing and posting this article.
Reply
70 JohnnyO August 27, 2010 at 9:18 pm
Well written! Wow. Great great great article!
Reply
71 jeffatrackaid September 8, 2010 at 2:26 am
Nice round up of some common server hardening techniques. While not specific to the server, I would add having a web application
firewall, e.g. mod security or something similar. According to SANS, most exploits these days happen via web applications. Even
with these tips (SELinux excepted), attackers can often setup shell kits, spam bots or similar tools.
Also, never just rely on the hardening. Using something like Nessus to audit the server. With a professional feed, you can actually
audit against a variety of policies, such as the Center for Internet Security guidelines.
Reply
72 Liya Comp September 16, 2010 at 3:17 pm
Good article
Reply
http://www.cyberciti.biz/tips/linux-security.html
16/28
10/29/2014
17/28
10/29/2014
Reply
82 Shadus February 22, 2011 at 8:19 pm
Sudo is crap for security period except leaving an audit trail which any user with sudo access can get rid of trivially. Lets say you
have 5 admins each who needs root level access. With sudo that means each users password is another potential compromise of root
level privileges. There are things you can do to help with that like using rootpw or disabling the ability to get a true shell with sudo
but this breaks much of sudos functionality. Sudo is very good at offering a false sense of security and accountability of
LEGITIMATE users. It does very little for non-legitimate users.
Reply
83 Christopher Quinn March 5, 2011 at 4:47 am
perfect. I was searching how to disable the root access. I love this site. I cant believe I didnt find it sooner. I switched from shared
web hosting to vps web hosting and I love it.
Thanks!
Reply
84 DSpider March 24, 2011 at 12:53 am
Well, Christopher I think if, God forbid, the user account is compromised then you can simply login as root and delete it, along
with its ~/ directory. But if you disable root access I guess youd have to reinstall the OS.
Also, setting the noexec flag in fstab is a very smart move. Especially for data partitions (why would you wanna run binaries from a
data partition anyway ? Programs should have no business there). I thought this flag also applied for scripts. Hmmm.
Reply
85 Ramakrishna- krrish April 29, 2011 at 12:39 pm
Hi Sir, Am fan to your article.. Really these are very excellent sessions.. we never get this from any other books.. Really Am so happy
and we are improving our confidential levels by following your articles.. One small request, Why dont you keep an article on Solaris
server issues.. Because now a days, both unix and linux are growing popular across the world.. And so many administrators are
working in dual modes (LINUX and UNIX) . So, if the send an article based on linux and unix(solaris) then, so many administrators
feel much better..
Thanks
Reply
86 Ramakrishna - Krrish April 30, 2011 at 5:03 am
Hi Sir,
I have been trying to implement OpenLDAP server in CentOS5.4 for the past 10 months. But, till i havent implemented. I studied
and gathered so many books and articles.. even though am not succeeded. So, could you send openldap server configuration article in
CentOS5. Then i can follow your help to complete the task..And i need exactly what is ldap ? why for Ldap? where to Implement
ldap ?
I have so many doubts are there on ldap scenario. And how can join windows client to linux openldap server ? . If joins, how to do
that ? .. So, could you explain detailedly
with best regards..
thanks,
Ramakrishna krrish
Reply
87 d0rk-E May 28, 2011 at 8:56 pm
I have heard the arguments for and against #7, disable root login, and am for it
But you never tell me HOW to. :D
Reply
88 ckdie92hc8899s9 July 20, 2011 at 7:31 pm
http://www.cyberciti.biz/tips/linux-security.html
18/28
10/29/2014
19/28
10/29/2014
20/28
10/29/2014
21/28
10/29/2014
22/28
10/29/2014
Great read! Thanks for taking the time to put this out there.
Reply
118 Ravi July 18, 2013 at 11:27 am
Everything in one place and so neatThanks for sharing such a useful infoThanks in tons.
Reply
119 Ozjon July 20, 2013 at 6:45 am
Hey thanks for writing up an article on securing server. Today I had a lot of hacking on my vps server and I couldnt access any of the
sites. Anyway, I had to go in and kill apache via ssh and had to switch it off for 12 hours until the hacking went away. I later realised
that my wordpress sites were getting a whacked via the login path.
Your article is great thanks for sharing.
Oz
Reply
120 Mohammad Forhad Iftekher August 1, 2013 at 6:19 pm
+1, very handy
Systems Administrator
Disney Interactive
Reply
121 suresh September 16, 2013 at 9:18 am
Hi,
Great Article :)
Thanks
Reply
122 James October 16, 2013 at 4:11 pm
Thanks I needed this for a new server project that we have..
Great post!
Reply
123 Sepahrad Salour March 18, 2014 at 5:53 am
Thanks for your great article :)
I really love your website
Reply
124 Muhasa Ivans Enock April 28, 2014 at 1:34 pm
Great Info, I will now apply it on my new project file Server.
Reply
125 Cody July 26, 2014 at 1:14 pm
#13 is especially important when you consider the flaws of chroot (and any error that allows a user to chroot that is not root).
I seem to remember that /var (which yes, /var should be its own volume) and /var/tmp should be separate. More specifically, /tmp
should be its own volume and /var/tmp should be a symbolic link to /tmp
But Ill leave that to each administrator (I know there is something about this subject though but I cannot remember exactly what it
is about/for. It is a complete manual about security issues, from RedHat , that has it).
http://www.cyberciti.biz/tips/linux-security.html
23/28
10/29/2014
Reply
126 Steve September 19, 2014 at 9:53 pm
#1: the root vs sudo debate is entirely based on ignorance. the idea that if the user is compromised, all they have to do is sudo is
simply wrong. the exact same thing applys to the root user, if they are compromised, yet minus the sudo. what sudo offers is the
ability to resrict said user (with proper confuration), to specific subsets of functionality within the server. moreover, the administrative
user should have a complex user name, along side a password. this means that the would-be attacker needs to brute force both a
username, and a password. this decreases the likelyhood for success exponentially. finally, the sudo user should be combined with
something like Two-Factor Authentication. this makes said user incredibly difficult to succumb to an attack.
#2. remote logging is NOT for constantly monitoring. it IS something all distributed networks should employ. and it DOES serve a
purpose. purpose number one is the forensic logging. in the event of an intrusion, this provides an off site server where log files have
been untouched by any attacker. this may be the only way to figure out what has happenend to the system, and aids in identifying the
security hole, repairing it, and preventing future intrusions by such means. this helps a security analyst decide whether or not the
entire system has been compromised, or just part of it. and this leads me to number three
#3 Intrusion Detection or Prevention Software is of CRITICAL importance. to claim that these things add to the noise is just an
excuse, and lazyness, on the side of the system administrator. IDS software essentially takes the place of all those people who used to
monitor forensic logging components. the idea is to create an automous system and security blanket that detects emerging threats,
responds to events in real time, and alerts system administrators based on policy and threshold. combined with remote logging, this
can be done with fairly low over head, and can be maintained with fairly low overhead. the ideal IDS is a combination of a generic
firewall policy, file integrity checksum database software, brute force detection software, web and application firewall software, and
automatic log file analysis software. this system should be able to manipulate the firewall to respond to immediate threats. and once
this system is tuned for a specific use case scenario, it should be generate almost NO noise for the system administrator. in fact, it
should lessen any noise generated by a constant barrage of botnets and rouge hosts (that which constantly probe any system).
one must make note: fail2ban is NOT intrusion detection or prevention software. it may be used as part of the over all security
CHAIN but does not cover all the essential bases. furthermore, its used mostly as a set-it and forget-it tool. and in this state, is only
useful for brute force attacks. nothing more. and only reacts against a small number of predefined patterns.
#4 Firewall Rulesets are another CRITICAL component of any security audit. its inherently unethical for any system administrator to
ignore this. after your system wide policy is defined, a generic rule set can be created to defend against generic attacks. this rule set
should use split horizon like topology to ensure a back door is always available to the system administrator, and to ensure that serverto-server channels are only accessable to desirable system. a basic incoming connection ruleset helps protect against malicious
malware from listening for connections in the user-space high port range. and each user should be restricted using the owner
module available in linux, so that they are only allowed to connect out to a predefined set of servers, and on a predefined set of ports.
another great feature is to ratelimit or set quotas for SYN packets going out per-user. all this helps deter malicious scripts from
connecting back to a command and control center, from downloading counterparts to malware, and helps prevents the machine from
participating in denial of service attacks.
5#. Auditing the software on your distributed network is essential. we are after all depending on a open source network of
programmers, and security is intended but often times realized as an afterthought. its not all that difficult to purge packages not in
use. anybody who thinks this is irrelevant negates the understanding of just how a compromise is usually acheived.
where this becomes much more relevant however, is when you are activley running server software or services that have not been
compiled with the latest kernel hardening features. i can guarantee that a large majority of production servers are running software
without these features compiled in. settings kernel flags becomes a MOOT POINT if the software it self has not been compiled to
USE THEM! this often means compiling and installing software from a more security wise, or up to date repository. sometimes it
means recompiling the software on your own.
6# its STILL important to have data on seperate partitions. however, current technology allows us to make this much easier. why
define seperate partitons for everything when you can remount specific areas of your system with size allocation restrictions. again,
choosing NOT to implement safe guards is just plain laziness. this is often accomplished with a one liner in your FStab
7# encryption of files IS important. however, this is usually over-thought. typically, it would make the most sense to encrypt things
like: back up partitions. off-site storage. physical back up devices. system administrator /home volumes. anything with SENSITIVE
information. just because it is time consuming doesnt mean you should void the process. again, please refrain from laziness. just rethink the process. there is no need to encrypt EVERYTHING, just the IMPORTANT things. moreover, automatic encryped file
systems (using tools like encfs) makes this incredibly easy. there is NO excuse.
#8 refrain from laziness. it will be your undoing.
Reply
127 Steve September 19, 2014 at 10:13 pm
oh and #9: the MYTH that Chroot is insecure is just that. a MYTH. the Chroot is only as secure as the system administrator defines
http://www.cyberciti.biz/tips/linux-security.html
24/28
10/29/2014
it.
there is a reason why it is built in as a core security feature and principal of SSH, Apache, Dovecot, Sendmail, Postfix, Bind,
OpenVPN, and just about any other software that allows outside user interaction with internal system functionality. if you think that
they have implemented faulty secure mechanisms in the base system of our linux operating systems you are wrong.
the rules are simple: do not run any services in chroot as Root. do not run any services inside the chroot which are running under the
same user outside the chroot. if possible, seperate each service into its own chroot. use namespaces to virtualize /tmp and /var/tmp in
order to inhibit race conditions. do not mount unessecary devices or filesystems. if you do mount a device or filesystem, ensure its
permissions are set to as restrictive as possible. only include nessecary applications and libraries. find a way to keep these up to
date. if you cant keep them up to date easily, then hardlink or bind mount them. audit all setuid/setguid bit applications. clean up
dangling symlinks. use a minimal copy of /etc/passwd and /etc/group. and so on an so forth.
why are these rules simple? because most of the are the same rules you should be enforcing on the BASE system. your BASE
system security is just as important as your chroot security. chroot is NOT a replacement for an overall audit.
chroot is still relevent in a wide range of use case scenarios. so do not be afraid to use it. the MYTH that you can easily break out of a
chroot is also just that. a MYTH.
security is only effective when used in LAYERS, and file system virtualization of any kind is a very essential layer to any security
solution.
YES, chroot was invented for a totally different purpose. but so was a whole wack of things in life. over time it has evolved to suit a
plethora of different purposes, including for layering security. in fact, chroot led to namespaces, which led to virtualization. you can
think of openvz as Chroot on steroids. this may be over simplifying it, but it does not effect my point.
Reply
128 Cody September 27, 2014 at 1:12 pm
It isnt that chroot is insecure per se. It is that it has risks (some of which depend on if the file systems are properly separated
i.e., on different partitions, just like your point in regards to #6). And yes, youre right: security is a layered concept (I would
rather extend your point and suggest that without layers it isnt security, at all). And yes, chroot has uses, many uses (e.g.,
building packages, analysis of something that is potentially risky, , the latter which would be better in a VM like you refer
to). But this question is all one needs to think about:
Why is it that the chroot system call (see chroot(2) ) will give an unprivileged user the error EPERM (ie permission denied) ?
Sort of like why is it that chown has similar restrictions. Of course, theres more than one thing that can prevent chroot from
working, but thats not really relevant (if anything it makes the point more relevant, consider that a paradox if you want).
FreeBSDs jail syscall is stronger as is noted in the Linux man page for chroot.
So it isnt a myth any more than being logged in as root for anything beyond what absolutely must be done as root, is a bad
idea. Dont have time to read the rest (only by chance saw your response to #6) but youre absolutely correct: technology
evolves and that is a good thing indeed. Still, there is a reason chroot is restricted (just like chown).
Reply
129 Mohammad Hossein October 9, 2014 at 11:03 am
Instead of number #2 try jailing its a more appropriate technique.
Reply
130 Mohammad Hossein October 9, 2014 at 11:03 am
* Number #3
Reply
Leave a Comment
Name *
E-mail *
Website
http://www.cyberciti.biz/tips/linux-security.html
25/28
10/29/2014
nixCraft
Follow
+1
+ 101,804
Related Posts
Security Tip: Find Out Current Working Directory Of A Process Running on Linux/Unix
http://www.cyberciti.biz/tips/linux-security.html
26/28
10/29/2014
Linux Failed Login Control: Lock and Unlock User Accounts Using PAM
27/28
10/29/2014
Subscribe to nixCraft
Learn something new about Linux/Unix by email
Enter your email address:
Subscribe
2004-2014 nixCraft. All rights reserved. Privacy Policy - Terms of Service - Questions or Comments - We are proudly powered by Linux
+ Nginx + WordPress.
The content is copyrighted to nixCraft and may not be reproduced on other websites.
http://www.cyberciti.biz/tips/linux-security.html
28/28