Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Security Features Linux and Unix operating system, programming     - CentOS and RHEL installation under GAMIT10.6 (Linux)

- Tsunami-udp accelerated network transmission (Linux)

- To install the latest version of the EPEL on CentOS 5.x or 6.x (Linux)

- Android engineers interview questions (Programming)

- Java objects to garbage collection (Programming)

- Setting Hibernate connection MySQL database connection pool coding (Database)

- CoreOS use register mirror to build private warehouse (Linux)

- Ubuntu 14.04 modify environment variables (Linux)

- Redis application of Sina Weibo (Database)

- Android Studio Installation and Configuration Guide tutorial (Linux)

- How to extend / remove swap partitions (Linux)

- Bash command substitution (Programming)

- CentOS7 virtual machine settings, and bridging problems (Linux)

- When Vim create Python scripts, vim autocomplete interpreter and encoding method (Programming)

- Oracle 11g forget approach SYS and SYSTEM password (Database)

- Easy to install CentOS 6.6 desktop environment (Linux)

- Use OpenSSL for RSA encryption and decryption (Linux)

- TypeScript basic grammar (Programming)

- CentOS 5.3 under broadcom NIC dual activation issues (Linux)

- Android main thread message system (Handler Looper) (Linux)

  Security Features Linux and Unix operating system, programming
  Add Date : 2016-11-20      
  In consideration of the operating system inherited security, when there is an often overlooked problem (which to comply with Microsoft's taste): If you are the Windows platform programming, then your software will only be a limited operating system, version, and run the patch layer. The UNIX and Linux on the contrary, they include a lot of open source, commercial, and government development version, and applications across many different platforms, often freely distributed, and these platforms have very different security features.

As some readers only work on Windows, so here to tell us about * nix. UNIX and Linux division in its kernel and user space. Most programs can be run on the user space of the kernel. Just contact Linux programmers, especially those with experience in UNIX developers, and sometimes can not be conscious Linux is not just a free version of UNIX; fact, there does have some significant differences. From a security perspective, most versions of Linux are very similar because they are based on the same kernel and C library. One notable difference is, Linux kernel modules dynamically loaded on demand to provide specialized support.

In addition to the difference between UNIX and Linux or more, there are also significant differences in safety between different versions of UNIX. Go for UNIX-Linux developers, these differences less obvious, but important. For example, some UNIX and similar operating system will be mandatory access control, while others will not.

There is also a closely related platform: Free Software HURD macro kernel * nix, it has its own security features.

Some UNIX platforms, most notably OpenBSD, during the time the default installation itself would be more secure than other operating systems; the application will run as if they are written in some other versions of UNIX systems, so these applications still need to achieve their own security features, and follow some good programming practices.

For developers, understanding the thread and process is particularly important. In the UNIX variant, the threads often be treated separately, but by the system to perform scheduling. In Linux, the process and thread in fact no difference. In UNIX, the same process in the thread shared memory, but Linux process creates another process, and can define what resources can be shared, and which can not. Linux developers often use "Task (task)" word, but in fact they are talking about process. For the most secure way for applications to be portable, developers should stick with the standard thread library.

In particular, if you want applications to be ported, then you should use the "fork" call to create a new process. Note that, if possible, to stick with the fork, it is very important. Do not use "vfork", which is an optimized version of the BSD development of fork (and therefore widely used), and considerations for compatibility, has also been introduced Linux. The reason is simple: vfork allow the child process share (or, more precisely, to take over) the parent process of memory and control, which can lead to conflicting child and parent processes. In some versions of Linux inside, vfork will be hacked in a particular case.

Although Windows has one way or another obvious and well-known problem that sense, Microsoft's developers to implement the security program is relatively easy, because they are working platform diversity has been limited.

UNIX and Linux developers, especially cross-platform developers may have particular sensitivity to security, because their operating system may default on safer conditions; however, the safety between different versions of UNIX there are many differences, the difference is even bigger than between UNIX and Linux. Among them many of the same characteristics are often masked by these differences, and the portability factor is exacerbated these differences. No C or VBASIC under which Windows programmers will think of his or her application will invariably only running on UNIX platforms, or vice versa; but in UNIX / Linux within the community, to remember, because the application may be running on different platforms, so it may not run at the same level of security, it is important.
- Install minimize RHEL / CentOS 7 things to do (Linux)
- Ubuntu Gitolite management Git Server code base permissions (Server)
- Understanding Java classes (Programming)
- Radius server setup under CentOS (Server)
- History of the most complex validation e-mail address regular expression (Linux)
- Use OpenSSL carried BASE64 encoding and decoding (Linux)
- Installation Mesos + Marathon + Zookeeper under CentOS 7 (Server)
- Zabbix Agent for Linux Installation and Configuration (Server)
- Use UDEV SCSI Rules configured ASM on Oracle Linux 5 and 6 (Database)
- Configuring a Linux operating system security management services (Linux)
- How to upgrade to Ubuntu 14.04 Ubuntu 14.10 (Linux)
- Security measures under Unix multi-user operating system (Linux)
- CentOS terminal display Chinese (Linux)
- ActionContext and ServletActionContext Summary (Programming)
- S5PV210 development board for embedded development environment to build under Ubuntu (Linux)
- Elixir: the future of programming languages (Programming)
- Ceph cluster disk is no workaround for the remaining space (Server)
- PHP loop reference caused strange problems (Programming)
- Ubucompilator-Ubuntu, Debian, Linux Mint created deb package of graphical tools (Linux)
- ls command: 15 Level Linux interview question (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.