linuxsecurityresource.blogspot.com linuxsecurityresource.blogspot.com

linuxsecurityresource.blogspot.com

Linux Security Resource

Random musings on Linux Security Topics

http://linuxsecurityresource.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR LINUXSECURITYRESOURCE.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

March

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Tuesday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.0 out of 5 with 9 reviews
5 star
0
4 star
4
3 star
3
2 star
0
1 star
2

Hey there! Start your review of linuxsecurityresource.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.3 seconds

FAVICON PREVIEW

  • linuxsecurityresource.blogspot.com

    16x16

  • linuxsecurityresource.blogspot.com

    32x32

CONTACTS AT LINUXSECURITYRESOURCE.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Linux Security Resource | linuxsecurityresource.blogspot.com Reviews
<META>
DESCRIPTION
Random musings on Linux Security Topics
<META>
KEYWORDS
1 disk throughput
2 hdparm t /dev/sda1
3 disk i/o statistics
4 notes
5 virtual memory statistics
6 oes2 home /proc # vmstat
7 swappiness
8 cat /proc/sys/vm/swappiness
9 proc/diskstats
10 of reads issued
CONTENT
Page content here
KEYWORDS ON
PAGE
disk throughput,hdparm t /dev/sda1,disk i/o statistics,notes,virtual memory statistics,oes2 home /proc # vmstat,swappiness,cat /proc/sys/vm/swappiness,proc/diskstats,of reads issued,of sectors read,of writes completed,of sectors written,rd sec/s,wr sec/s
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Linux Security Resource | linuxsecurityresource.blogspot.com Reviews

https://linuxsecurityresource.blogspot.com

Random musings on Linux Security Topics

INTERNAL PAGES

linuxsecurityresource.blogspot.com linuxsecurityresource.blogspot.com
1

Linux Security Resource: January 2010

http://linuxsecurityresource.blogspot.com/2010_01_01_archive.html

Thursday, January 21, 2010. Multi-Party Authorization basically requires that at least 2 authorized individuals need to authenticate before the data can be accessed. This "2 key" approach is sort of like the launch control for a nuclear Missile that requires 2 different people to turn keys before blowing up some small corner of the world. Subscribe to: Posts (Atom). Open SuSE Security Page. Red Hat Security Page. Knoppix Security Tool Distribution. Hardening Your Linux System (from OpenSuSE.org). I've be...

2

Linux Security Resource: January 2011

http://linuxsecurityresource.blogspot.com/2011_01_01_archive.html

Friday, January 21, 2011. Creating Certificates with Multiple Hostnames. And www.example.org. You need to tell openssl to create a CSR that includes x509 V3 extensions and you also need to tell openssl to include a list of subject alternative names in your CSR. In my openssl.cnf I have the following:. In the [req] section. Req extensions = v3 req. In the v3 req section. Extensions to add to a certificate request. KeyUsage = nonRepudiation, digitalSignature, keyEncipherment. SubjectAltName = @alt names.

3

Linux Security Resource: September 2010

http://linuxsecurityresource.blogspot.com/2010_09_01_archive.html

Tuesday, September 28, 2010. Use aide to monitor core system configuration files. AIDE (Advanced Intrusion Detection Environment) can be used to help track file integrity by comparing a 'snapshot' of the system's files prior to and after a suspected incident. It is a freeware version of Tripwire, AIDE uses a database to accumulate key file attributes like permissions, mtime, ctime, and number of links for a system. The idea is to build the database before 2 things occur:. Then i have the aide.log mai...

4

Linux Security Resource: March 2011

http://linuxsecurityresource.blogspot.com/2011_03_01_archive.html

Wednesday, March 30, 2011. Disk Performance Trending in Linux:. The Disk i/o system is often the slowest subsystem on the computer and one of the biggest bottlenecks in system performance. Disk i/o is critical for certain applications,. This document is a summary of the key factors that affect overall disk performance on the system and references for some tools that can be used to measure these factors on Linux Servers. Timing buffered disk reads: 154 MB in 3.01 seconds = 51.14 MB/sec. Here is the same d...

5

Linux Security Resource: keep user accessible data on separate disk partitions

http://linuxsecurityresource.blogspot.com/2010/10/keep-user-accessible-data-on-separate.html

Wednesday, October 20, 2010. Keep user accessible data on separate disk partitions. Separation of the operating system files from user files may result in a more secure system. ideally the following filesystems should be mounted on separate partitions:. I also suggest separate partitions for Apache and FTP server roots. Edit /etc/fstab file and make sure you add the following configuration options:. Do not set execution of any binaries on this partition (prevents execution of binaries but allows scripts).

UPGRADE TO PREMIUM TO VIEW 12 MORE

TOTAL PAGES IN THIS WEBSITE

17

OTHER SITES

linuxsecureserver.com linuxsecureserver.com

This Server is Working Fine

Your IP address is : 66.160.134.62. This Server is Working Fine.

linuxsecurity.blogfa.com linuxsecurity.blogfa.com

امنیت سیستم های linux

امنیت سیستم های linux. منبع و جزوه دوره پیشرفته امنیت سیستم های لینوکس. مواردی مربوط به بهینه سازی و بالا رفتن کیفیت کار Squid با انتخاب سخت افزار مناسب. چهار عامل به طور کلی در انتخاب سخت افزارها مهم هستند :. نوشته شده در ۸۹/۰۳/۱۲ساعت 14:40 توسط مهیار تاج دینی. دانلود دیسک زنده فدورا 12. برای دانلود دیسک زنده لینوکس فدورا ۱۲ از لینک زیر استفاده کنید ضمن اینکه دقیقا ۷ روز آینده نسخه ۱۳ آن منتشر خواهد شد. Get Fedora 12 Desktop Edition Now. نوشته شده در ۸۹/۰۲/۲۹ساعت 11:21 توسط مهیار تاج دینی. DNS , Hostname.

linuxsecurity.com linuxsecurity.com

Home - The Community's Center for Security

The central voice for Linux and Open Source security news. What is the most important Linux security technology? SUSE: 2018:0866-1: important: coreutils. Ubuntu 3617-2: Linux (HWE) vulnerabilities. Ubuntu 3617-1: Linux kernel vulnerabilities. Debian LTS: DLA-1339-1: openjdk-7 security update. SUSE: 2018:0863-1: important: clamav. SUSE: 2018:0861-1: important: libvirt. RedHat: RHSA-2018-0627:01 Important: Red Hat JBoss Enterprise Application. Linux Security Week: April 2nd, 2018. InfoSecurity - Posted by.

linuxsecurity.com.pe linuxsecurity.com.pe

Default Web Site Page

If you are the owner of this website, please contact your hosting provider: webmaster@linuxsecurity.com.pe. It is possible you have reached this page because:. The IP address has changed. The IP address for this domain may have changed recently. Check your DNS settings to verify that the domain is set up correctly. It may take 8-24 hours for DNS changes to propagate. It may be possible to restore access to this site by following these instructions. For clearing your dns cache.

linuxsecurity.wordpress.com linuxsecurity.wordpress.com

Securing and Hardening Linux | Tips and Howto Linux Security

Securing and Hardening Linux. BIOS Security, Password Protection, and Limiting Reboots. January 2, 2008. Most modern computer BIOSes allow the restriction of bootable devices and password protection for BIOS settings. Different systems use different keystrokes to enter into the BIOS setup but the common ones are the Del key for AMI BIOS, Ctrl Esc for Phoenix BIOS, and the F10 key for Compaq BIOS. (more…). Recently on Securing and Hardening Linux…. Disable Internet Daemon Services. December 22, 2007.

linuxsecurityresource.blogspot.com linuxsecurityresource.blogspot.com

Linux Security Resource

Wednesday, March 30, 2011. Disk Performance Trending in Linux:. The Disk i/o system is often the slowest subsystem on the computer and one of the biggest bottlenecks in system performance. Disk i/o is critical for certain applications,. This document is a summary of the key factors that affect overall disk performance on the system and references for some tools that can be used to measure these factors on Linux Servers. Timing buffered disk reads: 154 MB in 3.01 seconds = 51.14 MB/sec. Here is the same d...

linuxsecurityservice.com linuxsecurityservice.com

Non-Existent Domain

Your browser does not support iframes, please click here.

linuxsecuritytutorials.com linuxsecuritytutorials.com

linuxsecuritytutorials.com - This website is for sale! - linuxsecuritytutorials Resources and Information.

The domain linuxsecuritytutorials.com. May be for sale by its owner! This page provided to the domain owner free. By Sedo's Domain Parking. Disclaimer: Domain owner and Sedo maintain no relationship with third party advertisers. Reference to any specific service or trade mark is not controlled by Sedo or domain owner and does not constitute or imply its association, endorsement or recommendation.

linuxseed.com linuxseed.com

WordPress › Setup Configuration File

Welcome to WordPress. Before getting started, we need some information on the database. You will need to know the following items before proceeding. Table prefix (if you want to run more than one WordPress in a single database). We’re going to use this information to create a. File If for any reason this automatic file creation doesn’t work, don’t worry. All this does is fill in the database information to a configuration file. You may also simply open.

linuxseed.net linuxseed.net

Coming soon...

linuxseed.org linuxseed.org

Coming soon...