Attempts to "harden" (tighten the configuration of) a Red Hat or Mandrake Linux installation.
Information collected from many sources: feature articles, advisories, news, documentation, forums, links.
Linux Security, server hardening, 1U server, 24x7 server admin, monitoring, IDS, NDS, firewalls
Known vulnerabilities on the Linux system with detailed description.
Step by step, example driven, HOWTO on building a Linux box with an aim towards strong security. Also, links to resources and mailing lists.
Companion Website to Hacking Linux Exposed, Osborne/McGraw-Hill. Source code from the book, updates, and other tools to secure your Linux system.
InterSect Alliance are the creators of the SNARE Linux C2-style Audit module, and have a consulting background in advanced audit analysis, intrusion detection systems, and forensics for Unix and other operating systems.
A kernel module that detects and stops overflow attacks, like Linux Buffer Overflow attack security, which aim to get an interactive access to the system.
Selective privileges (capabilities), cryptography, random number devices.
Linuxbroker provides all types of resources you need like Linux newsgroups search engine, daily news, howtos, applications releases tracking and security alerts.
|