Linux Audit
Linux security and system management blog
Linux Audit is one of the few blogs dedicated to Linux security. We aim for high-quality articles to explain security concepts and how they apply to Linux systems.
Interested in a particular subject or want to look around? The glossary might be a great start.
Stay up-to-date and the RSS/Atom feed to your RSS reader (e.g. Thunderbird)!
Did you know?
You can see wich processes are using a mount point and block unmounting it
lsof /mnt/photosAlso 💙 the command-line or terminal? Have a look at the command-line tips.
Latest articles
OpenSMTPD hardening profile
Tighten the already secure OpenSMTPD software on Linux by using this predefined profile that uses the systemd sandboxing options.
pacman cheat sheet
Cheat sheet for using the pacman package manager on Linux systems, including common tasks that are to be performed with pacman.
How to reload or restart a systemd service?
Services that are controlled with systemd can be reloaded or restarted depending on their configuration. Use systemctl to perform the related restart tasks.
How to check if a systemd service is enabled?
Systemd units can be enabled or disabled based on multiple factors, such as meeting specific dependencies. Learn how to see if a systemd service is enabled.
How to set environment variables in a systemd unit?
Systemd units can be configured to contain environment variables and passed along to the underlying application. Learn how to configure this unit setting.
Frequently Asked Questions
When it comes to Linux, there is so much to ask, like:
- How to see CPU details
- What is systemd?
- How to see errors and dropped packets on a network interface on Linux
Multiple sections within this site cover the frequently asked questions for Linux and Linux security.
- Data processing
- Linux file systems
- Hardware
- Kernel
- Networking
- Package manager
- Processes
- SSH
- System administration
- Systemd
Recent changes
- Linux Audit » Website information
- Cheat sheets for Linux » ip cheat sheet
- Systemd » Systemd commands
- Settings for systemd units » ProtectHome setting
- Settings for systemd units » ProcSubset setting
- Settings for systemd units » ProtectClock setting
- Settings for systemd units » ProtectSystem setting
- Settings for systemd units » NoExecPaths setting
- Settings for systemd units » NoNewPrivileges setting
- Settings for systemd units » LockPersonality setting
- Settings for systemd units » RestrictNamespaces setting
- systemd settings » Settings for systemd units
- Settings for systemd units » ProtectKernelModules setting
- Settings for systemd units » ProtectKernelLogs setting
- Settings for systemd units » ReadWritePaths setting
- Settings for systemd units » InaccessiblePaths setting
- Settings for systemd units » SystemCallFilter setting
- Settings for systemd units » DevicePolicy setting
- Settings for systemd units » SocketBindAllow setting
- Settings for systemd units » ProtectControlGroups setting
- Settings for systemd units » ExecPaths setting
- Settings for systemd units » SystemCallArchitectures setting
- Settings for systemd units » ProtectKernelTunables setting
- Settings for systemd units » RestrictRealtime setting
- Settings for systemd units » RuntimeDirectoryMode setting
Topics
Auditing
Inspect your systems with security tools and manually by knowing what to look for.
Most recent changed article (of 60):
› Linux Audit Framework
Automation
Save time by learning how to automate manual and repeating tasks.
Most recent changed article (of 12):
› Shell scripting
Compliance
Everything related to compliance, such as security auditing and system hardening.
Most recent changed article (of 15):
› In-depth Linux Guide to Achieve PCI DSS Compliance and Certification
File systems
Everything about storing data on a file system
Most recent changed article (of 25):
› Linux file permissions
Hardening
Apply defenses to your Linux systems and make them less vulnerable.
Most recent changed article (of 30):
› Linux server hardening and best practices
Kernel
Kernel parameters, system calls, and everything related to the core of every Linux system.
Most recent changed article (of 17):
› Sysctl
Linux
Everything related to Linux, from the basics of system administration to running services and securing them.
Most recent changed article (of 39):
› The state of Linux security
Lynis
Tips and insights in using this security tool.
Most recent changed article (of 26):
› How to update Lynis
Network
Network tuning and finding out why things are slow. Hint: it’s DNS.
Most recent changed article (of 25):
› ip cheat sheet
Software
Configure, maintain, and monitor software applications
Most recent changed article (of 38):
› Monitor file access by Linux processes
SSH
Hardening the SSH server and making smart use of SSH client options.
Most recent changed article (of 18):
› SSH
System administration
Learn generic Linux and security concepts with the articles in our system administrator category
Most recent changed article (of 220):
› ip cheat sheet
Vulnerabilities
Know what vulnerabilities could be present on your systems and how to harden your Linux environment.
Most recent changed article (of 12):
› Understanding Linux privilege escalation and defending against it