Enviar búsqueda
Cargar
linux security: interact with linux
•
13 recomendaciones
•
1,344 vistas
Ammar WK
Seguir
Im using this slide for my workshop this month at Medan, north sumatera, Indonesia
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 43
Descargar ahora
Descargar para leer sin conexión
Recomendados
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
Recomendados
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Más contenido relacionado
La actualidad más candente
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
La actualidad más candente
(20)
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Instal vnc in cent os
Instal vnc in cent os
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
ubunturef
ubunturef
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
Spesifikasi server
Spesifikasi server
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Windows cmd saukiniai
Windows cmd saukiniai
Git installation
Git installation
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
List Command at Run
List Command at Run
100+ run commands for windows
100+ run commands for windows
Linux command-cheat-sheet
Linux command-cheat-sheet
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Destacado
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Linux Security Myth
Linux Security Myth
Mackenzie Morgan
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Dobrica Pavlinušić
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Shawn Wells
Introduction To Linux Security
Introduction To Linux Security
Michael Boman
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Michael Boelen
Linux Security Overview
Linux Security Overview
Kernel TLV
Linux security-fosster-09
Linux security-fosster-09
Dr. Jayaraj Poroor
File System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
Basic Linux Security
Basic Linux Security
pankaj009
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen
Linux Security for Developers
Linux Security for Developers
Michael Boelen
What's New with Linux on System z
What's New with Linux on System z
Novell
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
Wong Chon Kit
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
The Linux Foundation
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
Destacado
(20)
Linux Security
Linux Security
Security and Linux Security
Security and Linux Security
Linux Security Myth
Linux Security Myth
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Security of Linux containers in the cloud
Security of Linux containers in the cloud
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Introduction To Linux Security
Introduction To Linux Security
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Overview
Linux Security Overview
Linux security-fosster-09
Linux security-fosster-09
File System Implementation & Linux Security
File System Implementation & Linux Security
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Basic Linux Security
Basic Linux Security
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Linux Security for Developers
Linux Security for Developers
What's New with Linux on System z
What's New with Linux on System z
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
Similar a linux security: interact with linux
Description of GRUB 2
Description of GRUB 2
iamumr
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Bud Siddhisena
Understanding The Boot Process
Understanding The Boot Process
Dominique Cimafranca
Introduction to linux
Introduction to linux
plarsen67
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Joachim Jacob
Ps3 linux
Ps3 linux
Keith Wright
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
bizet
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Alessandro Selli
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Kenny (netman)
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
arunkumar sadhasivam
Texas 2013
Texas 2013
krispcbsd
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Guy Barnhart-Magen
Os Bernier
Os Bernier
oscon2007
Df3 Std Manual
Df3 Std Manual
fernellyc88
Cgroups in android
Cgroups in android
ramalinga prasad tadepalli
Self 2013
Self 2013
krispcbsd
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
Build Your Own Android Tablet
Build Your Own Android Tablet
SGAndroidDevs
Mac book i phone android
Mac book i phone android
Tapan Khilar
How to reset lenovo password
How to reset lenovo password
johnsmith101010
Similar a linux security: interact with linux
(20)
Description of GRUB 2
Description of GRUB 2
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Understanding The Boot Process
Understanding The Boot Process
Introduction to linux
Introduction to linux
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Ps3 linux
Ps3 linux
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
Texas 2013
Texas 2013
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Os Bernier
Os Bernier
Df3 Std Manual
Df3 Std Manual
Cgroups in android
Cgroups in android
Self 2013
Self 2013
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Build Your Own Android Tablet
Build Your Own Android Tablet
Mac book i phone android
Mac book i phone android
How to reset lenovo password
How to reset lenovo password
Más de Ammar WK
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
Más de Ammar WK
(20)
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Pen-testing is Dead?
Pen-testing is Dead?
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Bugbounty vs-0day
Bugbounty vs-0day
Advanced Persistent Threat
Advanced Persistent Threat
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Burp suite
Burp suite
Web Hacking (basic)
Web Hacking (basic)
Network Packet Analysis
Network Packet Analysis
Packet analysis (Basic)
Packet analysis (Basic)
Network security
Network security
Penetration testing
Penetration testing
Information Security Professional
Information Security Professional
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
How To Become A Hacker
How To Become A Hacker
Último
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Último
(20)
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
linux security: interact with linux
1.
Interact with Linux
Deep [in[security knowledge y3dips@echo.or.id
2.
GNU/Linux? • Ever heard
linux? • Ever heard GNU? • So, Please explain GNU/Linux?
3.
Please, Met Tux!
4.
Security • Why do
we need security? • Securing what? • How to do that?
5.
Physicalenvirontment Secure the Security
6.
{Physical Security • Room
Security (lock) • CPU security (locak case, no cdrom… else)_ • Bios Security Disallow booting from floppy/cdrom/usb drive and network
Descargar ahora