HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Some of Linux specificities for security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Some of Linux specificities for security  
> Access to the content HTML Beginning of the presentation
PDF PDF version [1,7MB]  
> Description An introduction to some of Linux uses and specificites for security.  
> Context & Dates Talk made during Linux Expo Paris 2002, on 1st February 2002.
 
> Author Denis Ducamp and Thomas Seyrat 
> Type 30 slides [ French - HTML ]
Also available, a PDF file containing the 5 talks given at Linux Expo Paris 2002 [PDF - 1747KB]  
> Abstract &
Table of content
Flyleaf
Plan
Noyau - Rappel
Privilèges (capabilities)
Qu'est-ce qu'un privilège ?
Les privilèges du noyau Linux
Les privilèges des processus (1/2)
Les privilèges des processus (2/2)
Gestion des processus
Les privilèges des fichiers exécutables
Exemple de fichier exécutable, ping
Modules noyau
Rappel
Risques
Avantages pour l'administrateur
Avantages pour le pirate
Comptabilité
Les utilitaires de comptabilité
Mise en route
Statistiques
Chiffrement des systèmes de fichiers
Fonctionnement
Notes
Algorithmes
Exemple
Sécurisation noyau
Distributions sécurisées
subterfugue
Quelques perspectives ...
... pour le contrôle d'accès  
> Related documents
themeLinux
[Presentation]  Linux security characteristics [26 September 2000 - French/English]
[Presentation]  Overview of the main applications of Linux for security [26 April 2000 - French/English]
[Course]  Linux Security
[Presentation]  Linux and security [22 November 2002 - French]
[Presentation]  Linux Kernel Hardening - The useful and the futile in the grsecurity patch [28 January 2002 - French]
[Presentation]  Strengthening the Linux Kernel [6 February 2001 - French]
[Article]  Open-source software and security, the example of Linux [November 2000 - French]
[Tip]  Linux Kernel Modules (LKM): what benefits for administrators? [25 October 2000 - French/English]
[Presentation]  Linux and Security [13 April 2000 - French]
[Course]  Linux Security [9 December 1999 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
[Presentation]  Specific security characteristics of Linux [18 June 1999 - French]
[Presentation]  Linux for computer security [18 June 1999 - French]
[Presentation]  Linux for Computer Security [24 March 1999 - French]
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 17:31:56 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants