Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Simple security measures to reinforce the Linux kernel     - A well-known but rarely used skills: object pool (Programming)

- ORA-00600 error solve one case (Database)

- Setup Qt development environment under Linux (Linux)

- Spark build standalone version cluster (Server)

- Go build the locale under Windows (Linux)

- To use Android RecyclerView (Programming)

- JavaScript function part (Programming)

- Samhain: Powerful intrusion detection system under Linux (Linux)

- Not safe procedure under Linux (Linux)

- Linux kernel socket protocol stack routing lookup cache mechanism (Linux)

- How to allow users to access only a specific database (MSSQL) (Database)

- RHEL6.4 x86_64 build SVN service (Server)

- Linux5 install MySQL 5.6 (RPM mode) (Database)

- The correct method to modify the maximum number of concurrent connections Tomcat 7 (Server)

- Mac OS X Server installation and application (Linux)

- Linux input and output redirection (Linux)

- Using PPA to install the lightweight theme software HotShots 2.1.0 under Ubuntu (Linux)

- How to enable Software Collections (SCL) on CentOS (Server)

- How to install Ubuntu California - the calendar application (Linux)

- Java concurrent programming using the synchronized keyword ReentrantLock alternative primitive (Programming)

  Simple security measures to reinforce the Linux kernel
  Add Date : 2017-04-13      
  For large sites, Linux administrators should use a custom kernel. This brings the security and performance advantages more pronounced. Because we have the system administrator can select options to enhance the security of the system. Supported by prohibiting unnecessary driver support and modules, we can reduce the path to attack the system. We can also improve the Linux operating system kernel to prevent buffer overflow attacks but hardest of this highly destructive attack prevention, although such improvement requires system administrator with considerable experience and skill, but for many require high levels of security in terms of Linux system is still very necessary.

Buffer overflow is very difficult to implement because the intruder must be able to judge when a potential buffer overflow occurs and its location in memory of what occurred. Buffer overflow is also very difficult to prevent, the system administrator must completely remove the buffer overflow condition exists to prevent this form of attack. Because of this, many people even think that Linux Torvalds himself Linux security patches is important because it prevents all use of buffer overflow attacks. But require attention, these patches will also lead to the execution stack. Measures to reinforce the kernel-based, can be found on some security authority sites.
- Easy to install CentOS 6.6 desktop environment (Linux)
- Android components save state series - Activity (Programming)
- Configure the Linux kernel and use iptables to do port mapping (Linux)
- Build RPM package uses Docker mirror (Linux)
- Linux system security knowledge (Linux)
- Debian installation (Linux)
- C # assembly calls across constants, variables and functions (Programming)
- Performance comparison Fibonacci recursive and non-recursive (Programming)
- 4 lvcreate example commonly used commands (Linux)
- ld.so.conf.d profile (Linux)
- Configuring Haproxy log support (syslog logging support) (Server)
- Gentoo: !!! existing preserved libs problem (Linux)
- TOAST function in PostgreSQL (Database)
- How to install and use the malware detection tool LMD and ClamAV antivirus engine on Linux (Linux)
- Use Oracle Data Guard to complete cross-platform database migration cases (Database)
- MySQL composite partition (Database)
- Java proxy mode (Programming)
- Nginx version of helloworld (Server)
- RedHat6.4 installation tutorial --- Minimal Edition (Linux)
- Linux keyboard recording script (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.