Category:Linux security software
Linux (and Unix) have a multi-tier security that permits user root any system-wide changes. Regular users can be limited: where they can save files, what hardware they can access, their memory usage, applications, disk usage (quota), and the range of priority settings they can apply, can all be specified to provide sufficient freedoms. If necessary they must become root. (See su or sudo). There are also group accounts management, and file and directory permissions.
Linux security software examples include for:
- Authentication modules, PAM and OPIE;
- System logging, Syslog;
- Network services, TCP wrappers, port mappers, and xinetd;
- The shell, ssh.
- Security auditing, Crack, Tiger and Tripwire;
- Cryptographic software, TCFS;
- Packet filtering, iptables.
This category has only the following subcategory.
- ► Linux kernel live patching (5 P)
Pages in category "Linux security software"
The following 73 pages are in this category, out of 73 total. This list may not reflect recent changes (learn more).