Content deleted Content added
Narky Blert (talk | contribs) 2x links to DAB pages repaired |
Anomalocaris (talk | contribs) m <tt> → <samp> |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 1:
{{Portal box|Linux
Unixes have a multi-tier security that permits user ''[[root (Linux)|root]]'' any system-wide changes. Regular users can be limited: where they can save files, what hardware they can access, their memory usage, applications, disk usage ([[disk quota|quota]]), and the range of [[Scheduling (computing)|priority]] settings they can apply, can all be specified to provide sufficient freedoms. If necessary they must become ''root''. (See <
Unix security software examples include for:
Line 6:
*System logging, [[Syslog]];
*Network services, TCP wrappers, port mappers, and [[xinetd]];
*The shell, [[ssh]] (see also [[openssh]]), [[AutoSSH]].
*Security auditing, [[WZSysGuard]], [[Crack (password software)|Crack]], [[Tiger (security software)|Tiger]] and [[Tripwire (software)|Tripwire]];
*Cryptographic software, TCFS;
*Privilege delegation, [[CaclMgr]], [[sudo]];
*Packet filtering, [[pf]].
Many Unix software applications are [[open standard]] and [[Open-source software|open source]]. For example any application may extend its own authentication, configuration and logging over to PAM or Syslog.
{{DEFAULTSORT:Unix Security Software}}
|