Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Simple security measures to reinforce the Linux kernel     - To install HDRMerge 0.4.3 under ubuntu (Linux)

- Ubuntu Linux Change the PATH (Linux)

- Adding SSH to Github (Linux)

- Notebook computer forget password solution (Linux)

- Linux Shell Scripting multithreading (Programming)

- Kali Linux virtualbox rc = Error 1908 workaround (Linux)

- CentOS7 set boot directly into the command line interface (Linux)

- Ubuntu study notes and related problem solving (Linux)

- ogg Oracle to SQL Server 2005 to achieve synchronization (Database)

- JavaScript notes --Objects (Programming)

- How to install web crawler tool in Ubuntu 14.04 LTS: Scrapy (Linux)

- Upgrading to MySQL 5.7.9 MySQL 5.6.23 (Database)

- Try debugfs restore the deleted files ext3 file system (Linux)

- Tab set to four spaces in Vim (Linux)

- Nagios (centreon) monitoring LVS (Server)

- Windows SmartGit installation (Linux)

- Ubuntu install Eclipse can not find JAVA_HOME problem (Linux)

- Install VLC player on Ubuntu 14.10 (Linux)

- Piostat - Monitoring and Statistics Linux process (Linux)

- Hibernate Search and Lucene quick introduction (Linux)

 
         
  Simple security measures to reinforce the Linux kernel
     
  Add Date : 2017-04-13      
         
       
         
  For large sites, Linux administrators should use a custom kernel. This brings the security and performance advantages more pronounced. Because we have the system administrator can select options to enhance the security of the system. Supported by prohibiting unnecessary driver support and modules, we can reduce the path to attack the system. We can also improve the Linux operating system kernel to prevent buffer overflow attacks but hardest of this highly destructive attack prevention, although such improvement requires system administrator with considerable experience and skill, but for many require high levels of security in terms of Linux system is still very necessary.

Buffer overflow is very difficult to implement because the intruder must be able to judge when a potential buffer overflow occurs and its location in memory of what occurred. Buffer overflow is also very difficult to prevent, the system administrator must completely remove the buffer overflow condition exists to prevent this form of attack. Because of this, many people even think that Linux Torvalds himself Linux security patches is important because it prevents all use of buffer overflow attacks. But require attention, these patches will also lead to the execution stack. Measures to reinforce the kernel-based, can be found on some security authority sites.
     
         
       
         
  More:      
 
- Python 2.7.9 Installation on Linux CentOS 6.6 (Linux)
- Firewall settings oracle remote connection in Linux systems (Linux)
- MySQL Authorized a recovered (Database)
- Oracle table compression Technology Introduction (Database)
- Java polymorphism and exception handling (Programming)
- Sqoop data export import command (Database)
- MySQL import large amounts of data (Database)
- Virtual Judge environment to build and configure under Ubuntu (Server)
- Java, extends and implements Usage (Programming)
- PL / SQL -> UTL_FILE use presentation package (Database)
- Security Features Linux and Unix operating system, programming (Linux)
- Eclipse 3.7.2 can not start solving under Ubuntu 14.04 (Linux)
- Quota for Vsftpd do use disk quotas (Server)
- Installation GitLab appears ruby_block supervise_redis_sleep action run (Linux)
- Install Jetty on CentOS / RHEL 6.X (Server)
- Linux loopback adapter Driven Design (Programming)
- Spring Data JPA call a stored procedure examples (Programming)
- Linux system started to learn: how to solve the xxx is not in the sudoers file error (Linux)
- Defensive programming in PHP (Programming)
- C ++ casts New Standard Comments (Programming)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.