Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2005-01
Add to Favorite Get Latest Update

Analysis of security test and reinforcing technology of linux systems

LIU Hai-yan, WANG Zi-qiang, SHAO Li-song (Department of Information Engineering, Armored Force College of Engineering, Beijing 100072, China)  
There are always many security holes in a linux system when it is installed using default configurations. Several categories of security problems are analyzed facing linux systems that connects into networks, and then some specific methods are given to check if a linux system is secure. In order to reinforce the security of a linux system, many effective policies and methods are also provided that system administrators should adopt as well as some useful tools which my aid them.
【CateGory Index】: TP316
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 YAN Fu-qiang (Department of Computer,Hunan Institute of Humanities,Science and Technology,Loudi,417000,China);Research on the Safe Function of Linux Operating System[J];Journal of Loudi Teachers College;2005-05
2 CAO Jun-yong1,CHEN Shu-yu2,GUO Sheng-rong1(1.College of Computer Science,Chongqing University,Chongqing 400044,China;2.College of Software Engineering,Chongqing University,Chongqing 400044,China);Research on data protection to power-off problems in embedded Linux[J];Computer Engineering and Design;2007-01
3 ZHONG Sheng1,QIU Gang2,SUN Hong-bing1(1.PLA Information Engineering University,Zhengzhou 450002,China;2.State Key Laboratory of Integrate Service Network,Xidian University,Xi'an 710071,China);Security solution of process in Linux[J];Computer Engineering and Design;2007-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 GONG De liang (Computer Department , Chenzhou Teachers College, Chenzhou 423000, China);Develop Personal Fire-wall Software With Linux[J];Journal of Chenzhou Teachers College;2002-02
2 HE Qian, WANG Yong, WANG Zi-min (Network Information Center, Guilin University of Electronic Technology, Guilin 541004,China);Linux Shell Intrusion Detection Subject Based on Relation Analysis[J];Journal of Guilin University of Electronic Technology;2003-06
3 LUO Ke-meng,QIAN Li-zhi,TAO Sheng-xiang,WANG Hu-bang(Hefei Informationization Ammuneition Research Institute,Hefei 230031,China);A Video Acquisition and Processing System of Image Terminally Guided Projectile based on Linux[J];Fire Control and Command Control;2009-03
4 ZHOU Jun-hui YANG Jin-min (Network Information Center, Hunan Vocational College for Nationalities, Yueyang, Hunan 414000, China);The Design and Implementation of Linux Firewall Defense[J];Hunan Vocational College for Nationalities;2007-01
5 ZHOU Jun-hui YANG Jin-min (Hunan Vocational College for Nationalities, Yueyang Hunan 414008, China);Design and Implementation of Linux Firewall Defense[J];Journal of Hunan Metallurgical Professional Technology College;2007-01
6 WANG Zi-qiang, LIU Hai-yan, LI Yuan-zhou (Department of Information Engineering, Armored Force Engineering Institute, Beijing 100072, China);Theory and realization of vulnerability scanning system for unix host[J];Computer Engineering and Design;2005-02
7 Ma Guofu,Zhang Wei,Zhou Likun Central and judicial police officer college,Hebei,071000;Research and Implementation of Resource Monitor in Web IDS[J];Network Security Technology & Application;2006-08
8 Zeng Fanping (Department of Computer Science, National University of Science and Technology Hefei 230026);Security Design of an Information System of Electrical Power Supply[J];Microcomputth Applications;2001-12
9 Feng Zuhong (Second Nrothwest Institute for Ethnic Nationalities, Yinchuan , 750021);A Method of Configuring DNS in Constructing Subdomain[J];Modern Electronic Technique;2002-02
10 ;<etitle>Simplify configure of the mqil sener by Linux[J];Applications of The Computer Systems;2002-04
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Lin Xiaodong Xing Yusen Yang Yixian (Department of Information Engineering, Beijing University of Posts and Telecommunications, Beijing 100876);The Correction of Needham Schroeder Key Distribution Protocol[J];JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS;1997-04
2 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
3 ZHAO Yan~1, YUAN Ye~(2,3), LIU Bing~1 (1.Computer & Control College, Harbin Univ. Sci. Tech, Harbin 150080, China; 2.Dept. of Computer Science and Technology Harbin Engineering University,Harbin 150001,China; 3.Heilongjiang Information Industry Bureau, Harbin 150090,China);Unified authentication based on LDAP protocol and authentication mechanism named Kerberos[J];Information Technology;2004-12
4 CAO Jing - lie (Huanggang Polytechnic, Huanggang 438002 Hubei);NAS and SAN[J];Journal of Huanggang Polytechnic;2003-02
5 GU Feng( R & D Center, Zhuzhou Electric Locomotive Research Institute, CSR, Zhuzhou, Hunan 412001, China);Design of linux-based locomotive display system[J];Electric Drive For Locomotives;2005-01
6 SHI Wen Chang, SUN Yu Fang, LIANG Hong Liang, ZHANG Xiang Feng, ZHAO Qing Song, and SHAN Zhi Yong (Institute of Software, Chinese Academy of Sciences, Beijing 100080) (Redflag Software Corporation Limited, Beijing 100080);DESIGN AND IMPLEMENTATION OF SECURE LINUX KERNEL SECURITY FUNCTIONS[J];Journal of Computer Research and Development;2001-10
7 ZOU Yong, WANG Qing, and LI Ming-Shu (Institute of Software, Chinese Academy of Sciences, Beijing 100080);RESEARCH AND IMPLEMENTING OF REAL-TIME SUPPORT OF LINUX KERNEL[J];Journal of Computer Research and Development;2002-04
8 Jia Chunfu Xu Wei Zheng Hui (College of Information Technology and Science,Nankai University,Tianjin300071);Study on Kernel-level Security Audit Techniques of Linux System[J];Computer Engineering and Applications;2002-06
9 Guo Donghang Mu Chunli Guo Tongcheng(Dept.of Automation,Tsinghua University,Beijing100084);A Real-time Scheduling Algorithm and Its Implementation in rtLinux[J];Computer Engineering and Applications;2002-09
10 Feng Tao Yuan Zhanting(Center of Software Engineering,Gansu University of Technology,Lanzhou730050);Research and Design of Electronic Government Affairs System Based on LDAP[J];Computer Engineering and Applications;2003-25
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 LI Chun-yan (Department of Computer Science, Tangshan Teachers College, Hebei Tangsan 063000, China);Design and Implementation for Calling System[J];Journal of Tangshan Teachers College;2008-05
2 LIN Guiqing,GAN Ming,YUAN Zhengping(Graduate School of China University of Geosciences,Wuhan 430074,CHN);Design & Realization of Power Down Protection in NC System Based on Windows CE[J];Manufacturing Technology & Machine Tool;2009-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved