Monitoring
Apt-file
The command apt-file can help with discovering which files belong to a package or what package installed or provides them.
Summary
Smem
The command smem can help showing memory usage, including the usage of swap.
Summary
Iftop
The command iftop shows ongoing bandwidth usage on one or more network interfaces and is a great tool for troubleshooting network issues.
Summary
Security Defenses to Fortify your Linux Systems
Your Linux systems should be protected against common security attacks. By using 4 common techniques, we can fortify our systems like a real fortress.
Summary
Create a Linux security fortress; implementing security defenses using towers, bridges, and guards.
Still many companies have difficulties implementing basic security measures. Even after years of websites being defaced, and customer records stolen, the same mistakes are made over and over again. While this all might sound like an unsolvable situation, information security is getting attention from more people. If you are responsible for the system management of Linux systems, ignoring security is no longer an option.
Monitoring Linux Systems for Rootkits
Learn how to protect your Linux system against malware, such as implementing security measures like file integrity monitoring and malware scanning.
Summary
Learn how to protect your Linux system against malware, such as implementing security measures like file integrity monitoring, malware scanning, and consistent patch management.
Monitor for File System Changes on Linux
Protecting against file system changes is an important step in keeping your systems secure. Prevention is important, but detection might be more valuable!
Summary
The most important areas with information security are preventing some events from occurring and detecting it if something still happens. Unfortunately most companies forget to put enough effort in detection unauthorized activities.
In this article we have a special look at monitoring your file system, to detect changes to your critical system files and their configuration files.
Method 1: File Integrity tools
The first method is monitoring file changes with the help of specific tools. These tools usually created “hashes” of files and store them in a database. Hashes are small cryptographic signatures of a file. Similar techniques and terms are a checksum or parity information.