HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Linux security characteristics
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Linux security characteristics  
> Access to the content HTML Beginning of the presentation
HTML Also available as one HTML file (35 Ko)  
> Description Overview of the main security functions provided by Linux kernels and introduction to PAM (Pluggable Authentication Modules).  
> Context & Dates Talk made at Linux-Expo:
  • French version in Paris on 1st February 2000, Montreal on 10 April 2000 and Madrid on 26 April 2000.
  • English version in Sao Paulo on 26 September 2000.
     
  • > Author Denis Ducamp , English translation by Frédéric Lavécot  
    > Type 35 slides [ French/English - HTML ]  
    > Abstract &
    Table of content
    Flyleaf

    1. Introduction
    1.1 What is Linux?
    1.2 The main security functions of linux 2.2

    2. Capabilities
    2.1 What is a capability?
    2.2 Linux's Capabilities
    2.3 Processes Capabilities
    2.4 Setting capabilities to processes
    2.5 Setting capabilities to executable file
    2.6 References

    3. Linux Kernel Modules
    3.1 What is a Kernel Module
    3.2 Hazards
    3.3 Advantages for the administrator
    3.4 Advantages for crackers
    3.5 Références

    4. Accounting
    4.1 Utilities
    4.2 Requirements
    4.3 Statistics

    5. Filesystem ciphering
    5.1 How does the filesystem ciphering work?
    5.2 Notes
    5.3 Algorithms
    5.4 Exemple
    5.5 References

    6. Misc.
    6.1 Security patches
    6.2 Distributions sécurisées
    6.3 subterfugue

    7. PAM (Pluggable Authentication Modules)
    7.1 Configuration
    7.2 Modules
    7.3 References
     

    > Related documents
    themeLinux
    [Presentation]  Overview of the main applications of Linux for security [26 April 2000 - French/English]
    [Course]  Linux Security
    [Presentation]  Linux and security [22 November 2002 - French]
    [Presentation]  Some of Linux specificities for security [1 February 2002 - French]
    [Presentation]  Linux Kernel Hardening - The useful and the futile in the grsecurity patch [28 January 2002 - French]
    [Presentation]  Strengthening the Linux Kernel [6 February 2001 - French]
    [Article]  Open-source software and security, the example of Linux [November 2000 - French]
    [Tip]  Linux Kernel Modules (LKM): what benefits for administrators? [25 October 2000 - French/English]
    [Presentation]  Linux and Security [13 April 2000 - French]
    [Course]  Linux Security [9 December 1999 - French]
    [Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
    [Presentation]  Specific security characteristics of Linux [18 June 1999 - French]
    [Presentation]  Linux for computer security [18 June 1999 - French]
    [Presentation]  Linux for Computer Security [24 March 1999 - French]
    > Copyright © 2000, Hervé Schauer Consultants, all rights reserved.

     

    Last modified on 23 October 2002 at 14:08:10 CET - webmaster@hsc.fr
    Information on this server - © 1989-2010 Hervé Schauer Consultants