Your SlideShare is downloading. ×
0
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

linux security: interact with linux

2,162

Published on

Im using this slide for my workshop this month at Medan, north sumatera, Indonesia

Im using this slide for my workshop this month at Medan, north sumatera, Indonesia

Published in: Technology
0 Comments
12 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,162
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
272
Comments
0
Likes
12
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Interact with Linux Deep [in[security knowledge y3dips@echo.or.id
  • 2. GNU/Linux? • Ever heard linux? • Ever heard GNU? • So, Please explain GNU/Linux?
  • 3. Please, Met Tux!
  • 4. Security • Why do we need security? • Securing what? • How to do that?
  • 5. Physicalenvirontment Secure the Security
  • 6. {Physical Security • Room Security (lock) • CPU security (locak case, no cdrom… else)_ • Bios Security Disallow booting from floppy/cdrom/usb drive and network

×