Category:Unix security software: Difference between revisions

Content deleted Content added
move from linux -> unix
 
m <tt> → <samp>
 
(8 intermediate revisions by 7 users not shown)
Line 1:
{{Portal box|Linux|Computer security}}
Unixes have a multi-tier security that permits user ''[[root (Linux)|root]]'' any system-wide changes. Regular users can be limited: where they can save files, what hardware they can access, their memory usage, applications, disk usage ([[disk quota|quota]]), and the range of [[Scheduling (computing)|priority]] settings they can apply, can all be specified to provide sufficient freedoms. If necessary they must become ''root''. (See <ttsamp>[[su (Unix)|su]]</ttsamp> or [[sudo]]). There are also group accounts management, and file and directory permissions.
 
LinuxUnix security software examples include for:
*Authentication modules, [[Pluggable authentication module|PAM]] and [[OPIE Authentication System|OPIE]];
*System logging, [[Syslog]];
*Network services, TCP wrappers, port mappers, and [[xinetd]];
*The shell, [[ssh]] (see also [[openssh]]), [[AutoSSH]].
*Security auditing, [[WZSysGuard]], [[Crack (password software)|Crack]], [[Tiger (security software)|Tiger]] and [[Tripwire (software)|Tripwire]];
*Cryptographic software, TCFS;
*Privilege delegation, [[CaclMgr]], [[sudo]];
*Packet filtering, [[ipchainspf]].
 
MostMany LinuxUnix software applications are [[open standard]] and [[Open-source software|open source]]. For example any application may extend its own authentication, configuration and logging over to PAM or Syslog.
 
{{DEFAULTSORT:LinuxUnix Security Software}}
[[Category:Computer security software]]
[[Category:Unix security-related software]]
[[Category:Linux software|Security software]]
 
[[fa:رده:نرم‌افزارهای امنیتی لینوکس]]