< Back
Page 6 of 6
This chapter is from the book
References
- http://tldp.org/LDP/sag/html—The Linux System Administrator's Guide.
- http://tldp.org/HOWTO/User-Authentication-HOWTO—Setting up passwords.
- http://tldp.org/HOWTO/HOWTO-INDEX/admin.html#ADMSECURITY—The Linux security HOWTOs all in one place. Be sure to read over the Security-HOWTO for an overview.
- http://www.tldp.org/HOWTO/Shadow-Password-HOWTO.html—Explains the shadow password system.
- http://www.novell.com/coolsolutions/feature/11685.html—A brief but nice overview of permissions and how to set them in Nautilus/GNOME.
- http://www.gratisoft.us/sudo—The sudo program lets you delegate specific administrative tasks to particular users without turning over the Root password.
- http://www.kernel.org/pub/linux/libs/pam—Pluggable Authentication Modules in Linux.
- http://www.ncsa.uiuc.edu/UserInfo/Resources/Hardware/IBMp690/IBM/usr/share/man/info/en_US/a_doc_lib/aixbman/admnconc/pam.htm—This guide to PAM under IBM's flavor of Unix is helpful to Linux users, too.
- http://www.ibm.com/developerworks/linux/library/l-sc7.html—This article on "Practical Linux Security" offers an interesting take on handling users.
- http://searchenterpriselinux.techtarget.com/originalContent/0,289142,_sid39_gci928466,00.html—This Linux Security Learning Guide is a handy set of articles and links on the range of security topics. A free registration is required to access the guide.
- http://www.schneier.com/blowfish.html—The Blowfish encryption algorithm home page.
- http://linuxgazette.net/issue81/vikas.html—A summary of the Magic SysRq process.
< Back
Page 6 of 6