How to secure your Linux file system

by | Jan 23, 2018

Although Linux is considered the safest operating system, it has recently been proven that it is not always safe from vulnerabilities. Therefore, it is important to adopt security measures that guarantee that the servers and users' devices are well protected. For this, one of the first steps that should be considered is to protect the file system.

One of the tools that allow detecting alterations in the Linux file system is Tripwire. It is an Open Source data integrity and security software that monitors and alerts any changes that are registered in the system files.

The operation is based on the collation of the digital signature of the files and directories with a previous database of them. The database is generated by taking a snapshot at the time of installing or creating a file, and can only be accessed through an encrypted password. To guarantee its effectiveness, it must be installed and configured before connecting the device to the Internet for the first time.

Other similar tools are AIDE and Samhain, which offer features and functionalities that are very similar to Tripwire.




Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content