Content deleted Content added
No edit summary |
Anomalocaris (talk | contribs) m <tt> → <samp> |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1:
{{Portal box|Linux
Unixes have a multi-tier security that permits user ''[[root (Linux)|root]]'' any system-wide changes. Regular users can be limited: where they can save files, what hardware they can access, their memory usage, applications, disk usage ([[disk quota|quota]]), and the range of [[Scheduling (computing)|priority]] settings they can apply, can all be specified to provide sufficient freedoms. If necessary they must become ''root''. (See <
Unix security software examples include for:
Line 12:
*Packet filtering, [[pf]].
Many Unix software applications are [[open standard]] and [[Open-source software|open source]]. For example any application may extend its own authentication, configuration and logging over to PAM or Syslog.
{{DEFAULTSORT:Unix Security Software}}
|