Remove Guidelines Remove Linux Remove Operating Systems
article thumbnail

Securing Linux Policy

Tech Republic Security

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. From the policy: DEVELOP TEMPLATES BASED ON.

Linux 419
article thumbnail

Debian, the grandaddy of Linux operating systems, turns 30

TechSpot

The Linux distro was established by Ian A. Murdock created Debian from scratch, providing the guidelines needed to govern upgrades, installation procedures, and. On August 16, the Debian blog announced that the project is now officially 30 years old. Murdock in 1993, with a message sent to the comp.os.linux.development newsgroup.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. As soon as an image or template is out of date, we deploy insecure operating systems, which is what this security control prevents. Monitoring Changes to Identify Attackers or Rogue Employees.

article thumbnail

Using Puppet for Account Management

Scott Lowe

As such, we’ll want to follow Puppet’s guidelines for module structures. Using Puppet with Multiple Operating Systems. Linux Automation OSS Puppet' Let’s tackle that first step: creating the class and defined type. Similar Posts: Puppet, User Accounts, and Configuration Files. Getting Hiera Working.

article thumbnail

what every open source project needs

SPF13

The Internet Era: 00s • Internet changes everything • Open source movement gains traction (Linux, Apache, MySQL, PHP) • Tech selling ads, bits, hardware & services • Google Dominates. Summary: small poll for my new operating system? Open Source Companies • Redhat $13B • Cloudera $3B • MongoDB $1.6B • Docker $.5B

article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. Operating Systems/Applications. See this list of guidelines from Richard Bejarano. Networking. Interested in hardening macOS?

Linux 90
article thumbnail

Technology Short Take #29

Scott Lowe

Operating Systems/Applications. Speaking of Puppet, the puppet-lint tool is very handy for ensuring that your Puppet manifest syntax is correct and follows the style guidelines. Networking Security Storage Virtualization Automation Cisco CLI Encryption HyperV KVM Linux Microsoft NetApp OpenStack Puppet UCS VMware'

Vmware 134