Suche senden
Hochladen
linux security: interact with linux
•
13 gefällt mir
•
1,344 views
Ammar WK
Folgen
Im using this slide for my workshop this month at Medan, north sumatera, Indonesia
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 43
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
Empfohlen
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Weitere ähnliche Inhalte
Was ist angesagt?
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
Was ist angesagt?
(20)
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Instal vnc in cent os
Instal vnc in cent os
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
ubunturef
ubunturef
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
Spesifikasi server
Spesifikasi server
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Windows cmd saukiniai
Windows cmd saukiniai
Git installation
Git installation
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
List Command at Run
List Command at Run
100+ run commands for windows
100+ run commands for windows
Linux command-cheat-sheet
Linux command-cheat-sheet
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Andere mochten auch
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Linux Security Myth
Linux Security Myth
Mackenzie Morgan
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Dobrica Pavlinušić
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Shawn Wells
Introduction To Linux Security
Introduction To Linux Security
Michael Boman
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Michael Boelen
Linux Security Overview
Linux Security Overview
Kernel TLV
Linux security-fosster-09
Linux security-fosster-09
Dr. Jayaraj Poroor
File System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
Basic Linux Security
Basic Linux Security
pankaj009
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen
Linux Security for Developers
Linux Security for Developers
Michael Boelen
What's New with Linux on System z
What's New with Linux on System z
Novell
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
Wong Chon Kit
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
The Linux Foundation
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
Andere mochten auch
(20)
Linux Security
Linux Security
Security and Linux Security
Security and Linux Security
Linux Security Myth
Linux Security Myth
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Security of Linux containers in the cloud
Security of Linux containers in the cloud
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Introduction To Linux Security
Introduction To Linux Security
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Overview
Linux Security Overview
Linux security-fosster-09
Linux security-fosster-09
File System Implementation & Linux Security
File System Implementation & Linux Security
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Basic Linux Security
Basic Linux Security
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Linux Security for Developers
Linux Security for Developers
What's New with Linux on System z
What's New with Linux on System z
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
Ähnlich wie linux security: interact with linux
Description of GRUB 2
Description of GRUB 2
iamumr
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Bud Siddhisena
Understanding The Boot Process
Understanding The Boot Process
Dominique Cimafranca
Introduction to linux
Introduction to linux
plarsen67
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Joachim Jacob
Ps3 linux
Ps3 linux
Keith Wright
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
bizet
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Alessandro Selli
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Kenny (netman)
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
arunkumar sadhasivam
Texas 2013
Texas 2013
krispcbsd
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Guy Barnhart-Magen
Os Bernier
Os Bernier
oscon2007
Df3 Std Manual
Df3 Std Manual
fernellyc88
Cgroups in android
Cgroups in android
ramalinga prasad tadepalli
Self 2013
Self 2013
krispcbsd
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
Build Your Own Android Tablet
Build Your Own Android Tablet
SGAndroidDevs
Mac book i phone android
Mac book i phone android
Tapan Khilar
How to reset lenovo password
How to reset lenovo password
johnsmith101010
Ähnlich wie linux security: interact with linux
(20)
Description of GRUB 2
Description of GRUB 2
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Understanding The Boot Process
Understanding The Boot Process
Introduction to linux
Introduction to linux
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Ps3 linux
Ps3 linux
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
Texas 2013
Texas 2013
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Os Bernier
Os Bernier
Df3 Std Manual
Df3 Std Manual
Cgroups in android
Cgroups in android
Self 2013
Self 2013
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Build Your Own Android Tablet
Build Your Own Android Tablet
Mac book i phone android
Mac book i phone android
How to reset lenovo password
How to reset lenovo password
Mehr von Ammar WK
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
Mehr von Ammar WK
(20)
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Pen-testing is Dead?
Pen-testing is Dead?
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Bugbounty vs-0day
Bugbounty vs-0day
Advanced Persistent Threat
Advanced Persistent Threat
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Burp suite
Burp suite
Web Hacking (basic)
Web Hacking (basic)
Network Packet Analysis
Network Packet Analysis
Packet analysis (Basic)
Packet analysis (Basic)
Network security
Network security
Penetration testing
Penetration testing
Information Security Professional
Information Security Professional
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
How To Become A Hacker
How To Become A Hacker
Kürzlich hochgeladen
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
blackmambaettijean
Kürzlich hochgeladen
(20)
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
How to write a Business Continuity Plan
How to write a Business Continuity Plan
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
linux security: interact with linux
1.
Interact with Linux
Deep [in[security knowledge y3dips@echo.or.id
2.
GNU/Linux? • Ever heard
linux? • Ever heard GNU? • So, Please explain GNU/Linux?
3.
Please, Met Tux!
4.
Security • Why do
we need security? • Securing what? • How to do that?
5.
Physicalenvirontment Secure the Security
6.
{Physical Security • Room
Security (lock) • CPU security (locak case, no cdrom… else)_ • Bios Security Disallow booting from floppy/cdrom/usb drive and network
Jetzt herunterladen