Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Tele |
imported>Tele |
||
Line 139: | Line 139: | ||
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method. | * They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method. | ||
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. | * Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. | ||
=Understanding processes= | |||
* You can change the priorities of processes. | |||
* You can display the process tree. '''pstree''' command | |||
* You can check what file the process comes from. You can also check to which package a file belongs. | |||
* You can detect "zombie" processes and delete them. | |||
* You can limit the maximum number of processes. This is protection against fork bomb attack, but it does not guarantee system stability, if the user's process will be important for the stability of the system. | |||
[[Category:Contents Page]] | [[Category:Contents Page]] |