Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 10/03/2023 9:05:02 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 10/03/2023 9:05:14 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Bookmark


3 posted on 10/03/2023 9:13:39 AM PDT by rdl6989 ( )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Not sure how the article can claim that Linux has 96.4% of the webserver share

https://www.wappalyzer.com/technologies/web-servers/

I am not a linux guru, in fact I probably need a linux for dummies book

I could totally setup an IIS webserver with .Net framework cause that is really easy to do

but I can hardly mount a usb drive on linux


4 posted on 10/03/2023 9:42:16 AM PDT by algore
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

“A cybercriminal enters the network through brute force, or any credential abuse method.”

Just like any and all systems. Since 99% of Linux attack vulnerabilities are local and hands on, Local credential access is the main issue. Don’t let anyone near your machine and don’t give anyone credential root access you cannot personally hold accountable. And a very strong password that even their wildest dreams cannot figure out will prevent the 1% chance of brute force attacks from remote sources.


5 posted on 10/03/2023 9:50:21 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

bookmark


8 posted on 10/03/2023 10:03:07 AM PDT by mike70
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.

How would I do this?


10 posted on 10/03/2023 10:45:39 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Those of us who use Linux regularly have to guard against our tendency to think that with regards to security we’re bullet-proof. No such thing when it comes to any computer connected to the Internet, is there?


13 posted on 10/03/2023 1:14:12 PM PDT by Montana_Sam (Truth lives.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
Do you love Linux because of its user-friendly, exceptionally secure, heavy-duty, and open-source, making it easy to customize and maintain? If so, you’re not alone.

No, for me most of the above applies to Windows 11, as customized (which few do), thank God, but you knew that. Maybe someday MS will change too many things the wrong way and make the time needed to customize one of the multitudinous flavors of Linux warranted. No need to as of now, but thanks for being out there. Linux

It is no wonder that Linux has captured the lion's share of the IT market

I think the fact that it is free also has something to do with that.

19 posted on 10/03/2023 8:53:36 PM PDT by daniel1212 (As a damned+destitute sinner turn 2 the Lord Jesus who saves souls on His acct + b baptized 2 obey H)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson