As we work our way through this tutorial you will learn ho to list existing audit rules and moving onto creating custom audit rules in the CentOS 7 Linux audit system. This makes up part…
As we dig deeper into the objectives for the LPIC-3 303 exam we now start to look at the discretionary access control lists. This makes up the mode and ACL of a file. The original…
Moving forward with our series in Linux Security and the LPIC-3 303 exam we turn our attention to configuring the CentOS 7 auditd. The main configuration file for the auditd system is /etc/audit/auditd.conf. The audit…
As Linux administrators we have become used to the proliferation of SUID bits that we set on our systems. As long as the list of programs that have these permissions set does not change, then…
As we continue our series look at the LPIC-2 303 exam from the LPI and Linux Security we now turn our attention to packet captures. Although not specifically mentioned in the objective for Network Hardening…
How can I discover all hosts on my network? How can a hacker discover all hosts on your network ? Two very different questions from the view point of appropriate network use but the same…