Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ

[Berkeley Security] Recommended Resources for System Hardening

Post a reply

:
In an effort to prevent automatic submissions, we require that you enter the letters that are written in red.
Smilies
:D :) ;) :( :o :shock: :? 8-) :lol: :x :P :oops: :cry: :evil: :twisted: :roll: :!: :?: :idea: :arrow: :| :mrgreen: :geek: :ugeek: :angel: :clap: :crazy: :eh: :lolno: :problem: :shh: :shifty: :sick: :silent: :think: :thumbdown: :thumbup: :wave: :wtf: :yawn:

BBCode is ON
[img] is ON
[flash] is OFF
[url] is ON
Smilies are ON

Topic review
   

If you wish to attach one or more files enter the details below.

Expand view Topic review: [Berkeley Security] Recommended Resources for System Hardening

Re: [Berkeley Security] Recommended Resources for System Hardening

Post by trippingwire » Thu Aug 27, 2015 6:35 am

This are bad news indeed.
The biggest piss take in a while to be honest.

Been deploying grsec on servers and now all the work went the way of doh-doh.

I would be up for some modest crowdfunding.

Re: [Berkeley Security] Recommended Resources for System Hardening

Post by doerteDev » Thu Aug 27, 2015 4:22 am

https://grsecurity.net/announce.php

FUCKING RAGEQUIT! They lost the wars against the motherfucking GPL violating embedded industry. Secure kernels from now on only for the sponsors. Sponsor = $200 / mo. Wanna crowdfund anyone? (BTW RBAC audits incl.!)

[Berkeley Security] Recommended Resources for System Hardening

Post by parityboy » Mon Jan 19, 2015 12:16 am

System hardening is the process of securely configuring computer systems, to eliminate as many security risks as possible. While default security configurations for many products have improved greatly over the years, some options and settings favor ease of use over security, exposing vulnerabilites that can be used to compromise a system. Also, configurations appropriate for home users on private networks may not offer enough protection for systems handling sensitive information on the campus network. The resources below offer guidance on secure configurations and hardening procedures, beyond those required by the campus Minimum Security Standards.


Source

Top

cron
Nothing to display.

Login