Jump to content

Security-focused operating system

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Sohom Datta (talk | contribs) at 15:26, 1 November 2023 (Moved the information security down with navboxes, since it was converted to a navbox). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Android-based

Arch-based

Debian-based

Gentoo-based

Other Linux distributions

BSD

Xen

See also

References

  1. ^ "About The Calyx Institute - Calyx Institute". calyxinstitute.org. Retrieved 2 November 2021.
  2. ^ "Kali NetHunter Documentation". Kali Linux Documentation. Retrieved 5 April 2020.
  3. ^
  4. ^ "Parrot Security Could Be Your Next Security Tool". Linux.com | The source for Linux information. 2 December 2016. Retrieved 9 March 2018.
  5. ^ Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017.
  6. ^ "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 November 2012. Retrieved 10 July 2014.
  7. ^ Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. Retrieved 10 July 2014.
  8. ^ "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. Retrieved 10 July 2014.
  9. ^ Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint.
  10. ^ KITE Introduces a New Secured FOSS Based Operating System
  11. ^ A Look at Pentoo Linux and Its Security Analysis Tools, eWeek
  12. ^ 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
  13. ^ "about | Alpine Linux". alpinelinux.org.
  14. ^ says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com".
  15. ^ "Fedora Silverblue User Guide :: Fedora Docs". docs.fedoraproject.org. Archived from the original on 11 October 2021. Retrieved 11 October 2021.
  16. ^ OpenBSD Project (19 May 2020). "OpenBSD". OpenBSD.org. Retrieved 12 October 2020.
  17. ^ "Qubes OS bakes in virty system-level security". The Register. 5 September 2012.