Security
Security is the condition of being protected against danger or loss.
Language
Any
Platform
Linux
Remove
License
Any
Look in detail at how the HybridCloud application authenticates itself to cloud services, how Google Apps uses OAuth and how Force.com cloud services require built-in testing to avoid inadvertent...
This article discusses the risk associated with the use of the same security mechanism in multifactor authentication systems and proposes the use of GSS-API as a suitable option for achieving the...
The Pluggable Authentication Module (PAM) API exposes a set of functions that application programmers use for security-related functions like user authentication, data encryption, LDAP, and more. In...
A common response when someone first hears about containers is "How do I create a secure container?" This article answers that question by showing you how to use Linux Security Modules (LSM) to...
There are many tools available that allow you to synchronize files across UNIX directories, but doing it effectively, and securely, takes a little bit more effort. This article looks at solutions for...
Linux Pluggable Authentication Module (PAM) can help you protect world-writeable shared directories from abuse. This article for Linux system administrators lays out the steps to enable namespaces...
Security plug-ins bring new versatility to your database security setup in IBM DB2 9. Read this article to determine what should be tested before deploying your own customized security plug-ins....
Prepare for the Linux certification exams and build fundamental skills on Linux systems administration. This tutorial, the sixth in a series of seven on LPIC-2 exam 202 topics shows you how to...
Learn to configure DHCP, NIS, LDAP servers, and PAM to support authentication to prepare you for the LPIC-2. This tutorial series serves as a comprehensive study guide so you can take the exams with...
Want to assess security vulnerabilities on your Linux system without lengthy installation and configuration efforts? We introduce four packages -- Auditor, Whoppix, Knoppix-STD, and PHLAK -- that...
Inotify is a file system event-monitoring mechanism slated for
inclusion in upcoming Linux kernels that is designed to serve
as an effective replacement for dnotify, which was the de facto...
The loss of critical data can prove devastating. Still,
millions of professionals ignore backing up their data. While
individual reasons vary, one of the most common explanations is
that...
IBM e-business architect Chris Walden is your guide through a nine-part developerWorks series on moving your operational skills from a Windows to a Linux environment. In this part, we take stock of...
IBM e-business architect Chris Walden is your guide through a
nine-part developerWorks series on moving your operational
skills from a Windows to a Linux environment. In this part, we
track,...
This column explains how to write secure applications; it focuses on the Linux operating system, but many of the principles apply to any system. In today's networked world, software developers must...
In an uncharacteristic move, the U.S. National Security Agency recently released a security-enhanced version of Linux -- code and all -- to the open source community. This dW-exclusive article takes...