(Cheatsheet) Linux Security

(Cheatsheet) Linux Security

Cheatsheet

Linux Security Quick Reference Guide – An awesome security checklist reference

The intent of this Quick Reference Guide is to provide a starting point for improving the security of your system, to serve as a pointer to more in-depth security information, and to increase security awareness and methods that can be used to improve security. It is not a substitute for reading any of the vast amounts of Linux security documentation that already exists.In the ever-changing world of global data communications, inexpensive Internet connections, and fastpaced software development, security is becoming more and more of an issue. Security is now a basic requirement because global computing is inherently insecure. As your data goes from point A to point B
on the Internet, it may pass through several other points along the way, giving other users the opportunity to intercept, and even alter, your data. Even other users on your system may maliciously transform your data into something you did not intend. Unauthorized access to your system may be obtained by intruders, also known as “crackers”, who then use advanced knowledge to impersonate you, steal information from you, or even deny you access to your own resources.

(more…)

Linux Network Administrator’s Guide (2nd Edition)

Linux Network Administrator’s Guide (2nd Edition)


Description:

Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator’s Guide spells out all the information needed for joining a network, whether it’s a simple UUCP connection or a full LAN with a Linux system serving as a firewall, an NFS or NIS file server, and a mail and news hub.This book, which is one of the most successful to come from the Linux Documentation Project and remains freely distributable under its license, touches on all the essential networking software included with the operating system, plus some hardware considerations. Fully updated, the book now covers firewalls, including the use of ipchains and iptables (netfilter), masquerading, and accounting. Other new topics include Novell (NCP/IPX) support and INN (news administration). Original material on serial connections, UUCP, routing and DNS, mail and News, SLIP and PPP, NFS, and NIS has been thoroughly updated. Kernel options reflect the 2.2 kernel. However, some topics covered in other books (notably Samba and web server administration) are not in this book.

(more…)

Linux Administrator’s Security Guide

Linux Administrator’s Security Guide

Year: 2001

Description:

I wrote this book originally because no Linux security documentation existed back in the late 1990’s. Since then several Linux security books have been published, but in general they all have shortcomings (for example one of them spends 40 pages on cops, a largely obsolete tool). So anyways I’ve decided it’s time to update the book, which is one major advantage of doing this on the www. Currently it is April 2001, I’m hoping the major rewrite will be done by fall or winter of 2001 and then the LASG can go back into “maintenance” mode for a while

Contents:

(more…)

The Debian Administrator’s Handbook

The Debian Administrator’s Handbook

Description

The purpose of this book is to help you discover this distribution. We hope to share the experience that we have gathered since we joined the project as developers and contributors in 1998 (Raphaël) and 2000 (Roland). With any luck, our enthusiasm will be communicative, and maybe you will join us sometime. This book analyze a wide range of issues from the installation  and package maintenance to

(more…)

Self-Service Linux – Mastering the Art of Problem Determination

Self-Service Linux – Mastering the Art of Problem Determination

Year:2006 Pages:421

Description:

Linux is the best choice for home and business users. It is very powerful, as stable as any commercial operating system, secure, and best of all, it is open source. One of the biggest deciding factors for whether to use Linux at home or for your business can be service and support.The biggest factor in a company’s decision to go with Linux is overcoming the support issues. This book should be an essential part of every company’s Linux adoption plan to keep the total cost of ownership down and improve the ROI of their Linux strategy. It is also a book that advanced Linux professionals running their own Linux systems will be able to use to troubleshoot. This book gives the staff the basics they need to diagnose most problems that they will face and will go into the nitty-gritty on the toughest problems.

Contents:

Chapter 1:Best Practices and Initial Investigation
Chapter 2:strace and System Call Tracing Explained
Chapter 3:The /proc Filesystem
Chapter 4:Compiling
Chapter 5:The Stack
Chapter 6:The GNU Debugger (GDB)
Chapter 7:Linux System Crashes and Hangs
Chapter 8:Kernel Debugging with KDB
Chapter 9:ELF: Executable and Linking Format
(more…)

Linux 101 Hacks 2nd edition

Linux 101 Hacks 2nd edition

Year:2011  Pages:270

 

Description:

There are total of 101 hacks in this book that will help you build a strong foundation in Linux. All the hacks in this book are explained with appropriate Linux command examples that are easy to follow.

Contents:

  • Chapter 1: Powerful CD Command Hacks
  • Chapter 2: Essential Linux Commands
  • Chapter 3: SSH Commands and Tips
  • Chapter 4: Date Manipulation
  • Chapter 5: PS1, PS2, PS3, PS4 and PROMPT_COMMAND
  • Chapter 6: Archive and Compression
  • Chapter 7: Command Line History
  • Chapter 8: System Administration Tasks
  • Chapter 9: Install Packages
  • Chapter 10: LAMP Stack
  • Chapter 11: Bash Scripting
  • Chapter 12: System Monitoring and Performance

 

(more…)

Linux Firewall Configuration: Packet Filtering and Netfilter/iptables

Linux Firewall Configuration: Packet Filtering and Netfilter/iptables

Year: 2006

Description:

This document was written purely so people can start to grasp the wonderful world of iptables. It was never meant to contain information on specific security bugs in iptables or Netfilter. If you find peculiar bugs or behaviors in iptables or any of the subcomponents, you should contact the Netfilter mailing lists and tell them about the problem and they can tell you if this is a real bug or if it has already been fixed. There are very rarely actual security related bugs found in iptables or Netfilter, however, one or two do slip by once in a while. These are properly shown on the front page of the Netfilter main page, and that is where you should go to get information on such topics.

Contents:

(more…)

Linux Client Migration Cookbook, Version 2: A Practical Planning and Implementation Guide for Migrating to Desktop Linux

Linux Client Migration Cookbook, Version 2: A Practical Planning and Implementation Guide for Migrating to Desktop Linux

Year:2006

 

Description:

The goal of this IBM Redbooks publication is to provide a technical planning reference for IT organizations large or small that are now considering a migration to Linux-based personal computers. For Linux, there is a tremendous amount of “how-to” information available online that addresses specific and very technical operating system configuration issues, platform-specific installation methods, user interface customizations, and so forth. This book includes some technical “how-to” as well, but the overall focus of the content in this book is to walk the reader through some of the important considerations and planning issues that you could encounter during a migration project. Within the context of a pre-existing Microsoft Windows-based environment, we attempt to present a more holistic, end-to-end view of the technical challenges and methods necessary to complete a successful migration to Linux-based clients.

Contents

  • Part 1 Choosing Linux
  • Chapter 1. Introduction
  • Chapter 2. The case for migration
  • Part 2 Planning the pilot migration
  • Chapter 3. Organizational and human factors planning
  • Chapter 4. Technical planning
  • Chapter 5. Linux architecture and technical differences
  • Part 3 Performing the pilot migration
  • Chapter 6. Migration best practices
  • Chapter 7. Client deployment models
  • Chapter 8. Client migration scenario
  • Chapter 9. Integration how-tos
  • Part 4 Appendixes
  • Appendix A. Linux glossary for Windows users
  • Appendix B. Using enterprise management tools
  • Appendix C. Automating desktop migration using Versora Progression Desktop
  • Appendix D. Multi-station computing deep dive using Userful Desktop Multiplier
  • Appendix E. Client personalization
  • Appendix F. Desktop automation and scripting
  • Appendix G. Application porting

Downloads:

Read it online

 

 

 

 

 

 

 

pdficon
Download pdf

 

 

 

 

 

 

 

Licence

You can search for, view, or download Redbooks, Redpapers, Hints and Tips, draft publications and Additional materials, as well as order hardcopy Redbooks or CD-ROMs, at this Web site: ibm.com/redbooks  This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written

Linux IPv6 HOWTO

Linux IPv6 HOWTO

Year:2009 Pages:

Description:

The goal of the Linux IPv6 HOWTO is to answer both basic and advanced questions about IPv6 on the Linux operating system. This HOWTO will provide the reader with enough information to install, configure, and use IPv6 applications on Linux machines.

Contents:

(more…)

Linux Kernel in a Nutshell

Linux Kernel in a Nutshell

Year:2014 Pages:200

 

Description:

Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators.Linux Kernel in a Nutshell covers the entire range of kernel tasks, starting with downloading the source and making sure that the kernel is in sync with the versions of the tools you need. In addition to configuration and installation steps, the book offers reference material and discussions of related topics such as control of kernel options at runtime.
Author(s): Greg Kroah-Hartman

Contents:

  • Introduction
  • Requirements for building and using the kernel
  • Retrieving the kernel source
  • Configuring and Building
  • Installing and Booting From a Kernel
  • Upgrading a kernel
  • Customizing a Kernel
  • Kernel Configuration Recipes
  • Kernel Boot Command-line Parameter Reference
  • Kernel Build Command-line Reference
  • Kernel Configuration Option Reference

(more…)