Skip to main content
Search type Search syntax
Tags [tag]
Exact "words here"
Author user:1234
user:me (yours)
Score score:3 (3+)
score:0 (none)
Answers answers:3 (3+)
answers:0 (none)
isaccepted:yes
hasaccepted:no
inquestion:1234
Views views:250
Code code:"if (foo != bar)"
Sections title:apples
body:"apples oranges"
URL url:"*.example.com"
Saves in:saves
Status closed:yes
duplicate:no
migrated:no
wiki:no
Types is:question
is:answer
Exclude -[tag]
-apples
For more details on advanced search visit our help page
Results tagged with
Search options not deleted user 5319

Securing Linux systems and applications; understanding Linux security features.

4 votes

Allow apache to write to users' .ssh dir's

I'd probably suggest having cron fire a script that does nothing but edit those files with whatever is queued in the database to do. Allow that part of the script to act entirely outside of the realm …
StrangeWill's user avatar
  • 1,593
12 votes
Accepted

Linux or Windows- the security issue

I'm going to knock some of the bad notions here: 1) Linux is more secure because of less marketshare. … has helped immensely, lots of lessons were learned and directly applied to Linux. …
StrangeWill's user avatar
  • 1,593
3 votes

How can I remotely wipe the contents of a Linux Laptop if its been stolen?

Just a quick option I'll throw out there: have it create an SSH tunnel on boot. You'll have full control over all it's resources as long as it has an internet connection from work. Need to wipe it? W …
StrangeWill's user avatar
  • 1,593