public marks

PUBLIC MARKS from camel with tags debian & security

2008

Install and setup Xen on Debian 4.0 Etch — Lone-Wolf Scripts

(via)
Xen is a GPLed virtualization solution available in Debian 4.0 Etch repositories. This article help you to create a coherent Xen installation, with backups and minimum security enhancements. This guide fits my vision of a Xen setup. If it does not fit yours, you are free to adapt it to your needs, or to not use it. For information In this guide, i use the term "virtual host". Be aware that Xen use its own terminology. In a Xen setup, instanciated (aka. started) virtual hosts are called "Domains". Once your computer configured for Xen, all the operating systems run in "domains". The original operating system, where the Xen's control tools are installed, is called "dom0" (for domain No zero). All the guest operating systems are said to be installed in a "domU" (for User domain). As i'm a little lazy (well, yeah... very lazy), i don't want to endure this mind twisting, and i will mainly use the "virtual host" term in this guide. So, if you read this guide, don't by angry at me because of the terms i use.

Automated security updates in Debian « N0T a Blog

by 3 others
Subscribing to the security mailing lists is a must for every sysadmin, but who has the stamina and the determination to actually read them, and then analyze the impact of both the threat and the proposed fix? A more casual user with no life-or-death-critical servers would happily settle for a solution that would download and install the security patches automatically. As always in Linux, there is more than one way of achieving this.

2007

2006

Manuel de sécurisation de Debian - Après l'installation

Vous pouvez définir dans celui-ci les limites des ressources par utilisateur

2005

Debian Administration :: Tightening PHP Security

by 1 other
There are a lot of Debian systems running PHP code, and in their default state the Debian PHP packages don't tighten up security as much as they could. There are a lot of badly coded scripts out there which can be abused by malicious users. (PHP is in alone in that regard!)

camel's TAGS related to tag debian

admin +   administration +   amazon +   apache +   apache2 +   application +   applications +   apt +   asterisk +   backup +   bittorrent +   blog +   build +   cache +   cluster +   code +   configuration +   control +   convert +   database +   dedibox +   depot +   disk +   djbdns +   dns +   domaines +   dpkg +   environment +   etch +   file +   freenx +   ftp +   gestion +   groupware +   guide +   hosting +   howto +   image +   install +   interface +   iscsi +   isp +   lighttpd +   linux +   live cd +   lvm +   mail +   management +   mem +   migration +   Mirror +   monitoring +   mysql +   nagios +   network +   openoffice +   oreon +   packages +   performance +   php +   php5 +   postfix +   projet +   proxy +   qmail +   raid +   redmine +   remote +   replication +   rsync +   sauvegarde +   script +   secure +   security +   server +   serveur +   setup +   shell +   site +   sme +   spam +   ssh +   ssl +   suphp +   tools +   tutorial +   tutoriel +   ubuntu +   usb +   virtualisation +   virtualization +   vmware +   vnc +   vpn +   vserver +   web +   webcam +   wiki +   windows +   xen +