Last change: 2025-01-06
Harden system and user services by configuring systemd units with more strict file permissions using the unit setting RuntimeDirectoryMode.
Last change: 2025-01-06
Harden system and user services by configuring systemd units with more strict file permissions using the unit setting RuntimeDirectoryMode.
Last change: 2025-01-06
Learn how to use umask to set the default file permissions in Linux. We look at examples, including how and where to implement them.
Last change: 2025-01-06
Learn everything about the output that the stat command returns. Great for forensics, intrusion detection, and system administration.
Last change: 2025-01-06
Learn how to change the file permissions of files and directories on a Linux system. Follow the examples and make your system more secure.
Last change: 2025-01-06
Learn the basics of file permissions on Linux systems and filesystems such as ext4, XFS, and ZFS. Guided by examples and common Linux tools.
Last change: 2025-01-06
Learn the basics of how a Linux system applies file permissions. We look at examples to demystify the permissions mean and learn to troubleshoot common issues.
Last change: 2025-01-06
Learn how to find hardlinks on a file system or which files they have in common. We will use the find command to get this information quickly available.
Last change: 2025-01-06
Using file flags on macOS. While performing system hardening on macOS, you may encounter a typical chmod error. Learn how to fix this type of error
Last change: 2025-01-06
The /etc/shadow file is one of the most important files on Linux. Got an issue with the file permissions of your /etc/shadow password file? Look no further!
Last change: 2025-01-06
Setuid binaries may be a risk for the system. We will investigate how to remove the setuid bit and use Linux capabilities instead, to reduce the risks.
Last change: 2025-01-06
Linux users who want to compliant with PCI DSS have to restrict log file viewing to only the owner. Learn how to achieve this.
Last change: 2025-01-06
When file access control lists, or ACLs are being used, the output of ls will change. Learn about the additional plus sign in its output.
Last change: 2025-01-06
Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.