Enviar búsqueda
Cargar
linux security: interact with linux
•
13 recomendaciones
•
1,344 vistas
Ammar WK
Seguir
Im using this slide for my workshop this month at Medan, north sumatera, Indonesia
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 43
Descargar ahora
Descargar para leer sin conexión
Recomendados
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
Recomendados
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Más contenido relacionado
La actualidad más candente
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
La actualidad más candente
(20)
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Instal vnc in cent os
Instal vnc in cent os
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
ubunturef
ubunturef
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
Spesifikasi server
Spesifikasi server
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Windows cmd saukiniai
Windows cmd saukiniai
Git installation
Git installation
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
List Command at Run
List Command at Run
100+ run commands for windows
100+ run commands for windows
Linux command-cheat-sheet
Linux command-cheat-sheet
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Destacado
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Linux Security Myth
Linux Security Myth
Mackenzie Morgan
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Dobrica Pavlinušić
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Shawn Wells
Introduction To Linux Security
Introduction To Linux Security
Michael Boman
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Michael Boelen
Linux Security Overview
Linux Security Overview
Kernel TLV
Linux security-fosster-09
Linux security-fosster-09
Dr. Jayaraj Poroor
File System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
Basic Linux Security
Basic Linux Security
pankaj009
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen
Linux Security for Developers
Linux Security for Developers
Michael Boelen
What's New with Linux on System z
What's New with Linux on System z
Novell
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
Wong Chon Kit
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
The Linux Foundation
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
Destacado
(20)
Linux Security
Linux Security
Security and Linux Security
Security and Linux Security
Linux Security Myth
Linux Security Myth
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Security of Linux containers in the cloud
Security of Linux containers in the cloud
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Introduction To Linux Security
Introduction To Linux Security
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Overview
Linux Security Overview
Linux security-fosster-09
Linux security-fosster-09
File System Implementation & Linux Security
File System Implementation & Linux Security
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Basic Linux Security
Basic Linux Security
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Linux Security for Developers
Linux Security for Developers
What's New with Linux on System z
What's New with Linux on System z
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
Similar a linux security: interact with linux
Description of GRUB 2
Description of GRUB 2
iamumr
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Bud Siddhisena
Understanding The Boot Process
Understanding The Boot Process
Dominique Cimafranca
Introduction to linux
Introduction to linux
plarsen67
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Joachim Jacob
Ps3 linux
Ps3 linux
Keith Wright
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
bizet
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Alessandro Selli
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Kenny (netman)
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
arunkumar sadhasivam
Texas 2013
Texas 2013
krispcbsd
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Guy Barnhart-Magen
Os Bernier
Os Bernier
oscon2007
Df3 Std Manual
Df3 Std Manual
fernellyc88
Cgroups in android
Cgroups in android
ramalinga prasad tadepalli
Self 2013
Self 2013
krispcbsd
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
Build Your Own Android Tablet
Build Your Own Android Tablet
SGAndroidDevs
Mac book i phone android
Mac book i phone android
Tapan Khilar
How to reset lenovo password
How to reset lenovo password
johnsmith101010
Similar a linux security: interact with linux
(20)
Description of GRUB 2
Description of GRUB 2
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Understanding The Boot Process
Understanding The Boot Process
Introduction to linux
Introduction to linux
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Ps3 linux
Ps3 linux
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
Texas 2013
Texas 2013
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Os Bernier
Os Bernier
Df3 Std Manual
Df3 Std Manual
Cgroups in android
Cgroups in android
Self 2013
Self 2013
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Build Your Own Android Tablet
Build Your Own Android Tablet
Mac book i phone android
Mac book i phone android
How to reset lenovo password
How to reset lenovo password
Más de Ammar WK
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
Más de Ammar WK
(20)
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Pen-testing is Dead?
Pen-testing is Dead?
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Bugbounty vs-0day
Bugbounty vs-0day
Advanced Persistent Threat
Advanced Persistent Threat
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Burp suite
Burp suite
Web Hacking (basic)
Web Hacking (basic)
Network Packet Analysis
Network Packet Analysis
Packet analysis (Basic)
Packet analysis (Basic)
Network security
Network security
Penetration testing
Penetration testing
Information Security Professional
Information Security Professional
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
How To Become A Hacker
How To Become A Hacker
Último
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Último
(20)
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
linux security: interact with linux
1.
Interact with Linux
Deep [in[security knowledge y3dips@echo.or.id
2.
GNU/Linux? • Ever heard
linux? • Ever heard GNU? • So, Please explain GNU/Linux?
3.
Please, Met Tux!
4.
Security • Why do
we need security? • Securing what? • How to do that?
5.
Physicalenvirontment Secure the Security
6.
{Physical Security • Room
Security (lock) • CPU security (locak case, no cdrom… else)_ • Bios Security Disallow booting from floppy/cdrom/usb drive and network
Descargar ahora