About 63 results
-
Build Your Skills: IP address classes overview
Breaks down the five IP address classes in order to explain how they manipulate TCP/IP protocol functionality
-
USER_ADMIN alias
Sudo is a means to allow normal users limited root access. Sudo is also very versatile and can run across several servers. Here, Jim McIntyre gives you the lowdown on more advanced...
-
Limiting root access with sudo, part 1
Giving users unlimited root access is dangerous. Fortunately, you can opt to implement the sudo tool, which will provide limited root access to trusted users. Read on as Jim McInty...
-
Using Tripwire for filesystem integrity, part 2: Tripwire administration
In his second look at Tripwire, Jim McIntyre delves deeper into the configuration, running, and administration of this powerful security tool. Discover how to generate keys, use tw...
-
Linux file system security
A good policy for file system access can prevent many problems for system administrators. Join Jim McIntyre, author of "Linux File and Directory Permissions," as he answe...
-
Example 2. A sample Tripwire policy file
Tripwire has become a standard in Linux security. In this Daily Drill Down, Jim McIntyre walks you through the critical process of setting up and configuring the Tripwire detection...
-
Default installation directories
Log files are critical for the Linux system administrator. Unfortunately, many view using log files as a painful and arduous task. With the aid of swatch and logcheck, the monitori...
-
Manage Linux log files with Logrotate
Learn how to use the Logrotate program to administer, back up, and monitor log files on Linux.
-
Configure IT Quick: Log Linux system events with syslog
Get a step-by-step look at how to install, use, and optimize syslog for centralized login on Linux.
-
Administering Crack for Linux password security
Jim McIntyre completes his look at Crack by covering running Crack over networks, the Crack7 brute-force password-guesser, and establishing a password policy for your network.