Search Results
Search type | Search syntax |
---|---|
Tags | [tag] |
Exact | "words here" |
Author |
user:1234 user:me (yours) |
Score |
score:3 (3+) score:0 (none) |
Answers |
answers:3 (3+) answers:0 (none) isaccepted:yes hasaccepted:no inquestion:1234 |
Views | views:250 |
Code | code:"if (foo != bar)" |
Sections |
title:apples body:"apples oranges" |
URL | url:"*.example.com" |
Saves | in:saves |
Status |
closed:yes duplicate:no migrated:no wiki:no |
Types |
is:question is:answer |
Exclude |
-[tag] -apples |
For more details on advanced search visit our help page |
Securing Linux systems and applications; understanding Linux security features.
4
votes
Allow apache to write to users' .ssh dir's
I'd probably suggest having cron fire a script that does nothing but edit those files with whatever is queued in the database to do.
Allow that part of the script to act entirely outside of the realm …
12
votes
Accepted
Linux or Windows- the security issue
I'm going to knock some of the bad notions here:
1) Linux is more secure because of less marketshare. … has helped immensely, lots of lessons were learned and directly applied to Linux. …
3
votes
How can I remotely wipe the contents of a Linux Laptop if its been stolen?
Just a quick option I'll throw out there: have it create an SSH tunnel on boot.
You'll have full control over all it's resources as long as it has an internet connection from work. Need to wipe it? W …