New answers tagged security
0
votes
Is /dev/random data a psuedo-random AES cypher, and where does the entropy come from?
The current accepted answer is outdated. Linux now uses ChaCha20, a fast stream cipher, to generate pseudorandom data. Entropy is collected from a variety of sources, primarily the timing of ...
2
votes
checking for strong passwords in Linux as an admin
is there some acceptable means [via software?] to validate all set passwords are in fact up to some standard of character length and complexity, without actually finding out the set password of an ...
2
votes
checking for strong passwords in Linux as an admin
I can think of several ways to ensure all passwords meet standards:
Intercept the password when the user is logging in and verify it, maybe pretend it is expired if it isn't good enough. (I'm not ...
0
votes
Is UFW behind a firewall(ed) gateway router necessary
They do say it best to have more, as suggested in terms of security strategy against threats. "" The defense-in-depth approach
Relying only on your router's firewall is insufficient because ...
1
vote
Restricting wayland GUI applications from accessing all screen content
While I'm aware that the socket -- looking at it as a file with its file permissions -- is either all or nothing (read+write or not, hence the protocol is bidirectional), I was still expecting the ...
Top 50 recent answers are included
Related Tags
security × 2727linux × 550
ssh × 263
debian × 218
password × 181
permissions × 170
sudo × 138
networking × 131
ubuntu × 124
centos × 110
root × 103
users × 101
encryption × 97
bash × 93
firewall × 91
iptables × 86
selinux × 79
logs × 65
login × 65
pam × 61
files × 58
filesystems × 58
shell × 57
rhel × 57
linux-kernel × 57