Category:Unix security software

Unixes have a multi-tier security that permits user root any system-wide changes. Regular users can be limited: where they can save files, what hardware they can access, their memory usage, applications, disk usage (quota), and the range of priority settings they can apply, can all be specified to provide sufficient freedoms. If necessary they must become root. (See su or sudo). There are also group accounts management, and file and directory permissions.

Unix security software examples include for:

  • Authentication modules, PAM and OPIE;
  • System logging, Syslog;
  • Network services, TCP wrappers, port mappers, and xinetd;
  • The shell, ssh (see also openssh), AutoSSH.
  • Security auditing, WZSysGuard, Crack, Tiger and Tripwire;
  • Cryptographic software, TCFS;
  • Privilege delegation, CaclMgr, sudo;
  • Packet filtering, pf.

Many Unix software applications are open standard and open source. For example any application may extend its own authentication, configuration and logging over to PAM or Syslog.

Subcategories

This category has only the following subcategory.

L

Pages in category "Unix security software"

The following 9 pages are in this category, out of 9 total. This list may not reflect recent changes.


This page was last updated at 2023-07-06 22:19 UTC. Update now. View original page.

All our content comes from Wikipedia and under the Creative Commons Attribution-ShareAlike License.


Top

If mathematical, chemical, physical and other formulas are not displayed correctly on this page, please useFirefox or Safari