Submit Search
Upload
linux security: interact with linux
Report
Share
Ammar WK
Professional Bandwidth hunter at Inside your Machine
Follow
•
13 likes
•
1,344 views
1
of
43
linux security: interact with linux
•
13 likes
•
1,344 views
Report
Share
Download Now
Download to read offline
Technology
Im using this slide for my workshop this month at Medan, north sumatera, Indonesia
Read more
Ammar WK
Professional Bandwidth hunter at Inside your Machine
Follow
Recommended
Howto Make A Linux Boot Disk
Howto Make A Linux Boot Disk
Xaver Y.R. Chen
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗
Yuan Chiu
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
ichikaway
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ichikaway
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1
shortstp73
Recover linux after windows installation
Recover linux after windows installation
Amrinder Singh
How to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
Ubuntu presentation
Ubuntu presentation
Prakhar Gupta
More Related Content
What's hot
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Oomph, Inc.
Instal vnc in cent os
Instal vnc in cent os
Manusia Tenan
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Jonathan Franchesco Torres Baca
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
Yi-Chiao
ubunturef
ubunturef
wensheng wei
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
Spesifikasi server
Spesifikasi server
Julio Mukhlishin
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
竹田 大将
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
istp jva
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
Serverless
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
종인 전
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Samuel Guebo
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Mark Hemmings
Windows cmd saukiniai
Windows cmd saukiniai
Donatas Bukelis
Git installation
Git installation
Sitdhibong Laokok
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Sanjay Adhikari
List Command at Run
List Command at Run
Imam Dermawan
100+ run commands for windows
100+ run commands for windows
Anand Garg
Linux command-cheat-sheet
Linux command-cheat-sheet
Ifshar Ahmad
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Emertxe Information Technologies Pvt Ltd
What's hot
(20)
The Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
Instal vnc in cent os
Instal vnc in cent os
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
ubunturef
ubunturef
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
Spesifikasi server
Spesifikasi server
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
Ubuntu Cheat Sheet
Ubuntu Cheat Sheet
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
Windows cmd saukiniai
Windows cmd saukiniai
Git installation
Git installation
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
List Command at Run
List Command at Run
100+ run commands for windows
100+ run commands for windows
Linux command-cheat-sheet
Linux command-cheat-sheet
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
Viewers also liked
Linux Security
Linux Security
nayakslideshare
Security and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
Linux Security Myth
Linux Security Myth
Mackenzie Morgan
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Anne Nicolas
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Dobrica Pavlinušić
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Shawn Wells
Introduction To Linux Security
Introduction To Linux Security
Michael Boman
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Michael Boelen
Linux Security Overview
Linux Security Overview
Kernel TLV
Linux security-fosster-09
Linux security-fosster-09
Dr. Jayaraj Poroor
File System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
Basic Linux Security
Basic Linux Security
pankaj009
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen
Linux Security for Developers
Linux Security for Developers
Michael Boelen
What's New with Linux on System z
What's New with Linux on System z
Novell
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
Wong Chon Kit
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
The Linux Foundation
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
Viewers also liked
(20)
Linux Security
Linux Security
Security and Linux Security
Security and Linux Security
Linux Security Myth
Linux Security Myth
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Security of Linux containers in the cloud
Security of Linux containers in the cloud
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Introduction To Linux Security
Introduction To Linux Security
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Overview
Linux Security Overview
Linux security-fosster-09
Linux security-fosster-09
File System Implementation & Linux Security
File System Implementation & Linux Security
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Basic Linux Security
Basic Linux Security
Linux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Linux Security for Developers
Linux Security for Developers
What's New with Linux on System z
What's New with Linux on System z
Windows Server 8 Security Improvement
Windows Server 8 Security Improvement
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
Similar to linux security: interact with linux
Description of GRUB 2
Description of GRUB 2
iamumr
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Bud Siddhisena
Understanding The Boot Process
Understanding The Boot Process
Dominique Cimafranca
Introduction to linux
Introduction to linux
plarsen67
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Joachim Jacob
Ps3 linux
Ps3 linux
Keith Wright
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
bizet
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Alessandro Selli
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Kenny (netman)
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
arunkumar sadhasivam
Texas 2013
Texas 2013
krispcbsd
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Guy Barnhart-Magen
Os Bernier
Os Bernier
oscon2007
Df3 Std Manual
Df3 Std Manual
fernellyc88
Cgroups in android
Cgroups in android
ramalinga prasad tadepalli
Self 2013
Self 2013
krispcbsd
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
Build Your Own Android Tablet
Build Your Own Android Tablet
SGAndroidDevs
Mac book i phone android
Mac book i phone android
Tapan Khilar
How to reset lenovo password
How to reset lenovo password
johnsmith101010
Similar to linux security: interact with linux
(20)
Description of GRUB 2
Description of GRUB 2
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
Understanding The Boot Process
Understanding The Boot Process
Introduction to linux
Introduction to linux
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Ps3 linux
Ps3 linux
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
Texas 2013
Texas 2013
Linux Hardening - Made Easy
Linux Hardening - Made Easy
Os Bernier
Os Bernier
Df3 Std Manual
Df3 Std Manual
Cgroups in android
Cgroups in android
Self 2013
Self 2013
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Build Your Own Android Tablet
Build Your Own Android Tablet
Mac book i phone android
Mac book i phone android
How to reset lenovo password
How to reset lenovo password
More from Ammar WK
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
More from Ammar WK
(20)
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Pen-testing is Dead?
Pen-testing is Dead?
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Bugbounty vs-0day
Bugbounty vs-0day
Advanced Persistent Threat
Advanced Persistent Threat
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Burp suite
Burp suite
Web Hacking (basic)
Web Hacking (basic)
Network Packet Analysis
Network Packet Analysis
Packet analysis (Basic)
Packet analysis (Basic)
Network security
Network security
Penetration testing
Penetration testing
Information Security Professional
Information Security Professional
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
How To Become A Hacker
How To Become A Hacker
Recently uploaded
Global Lighthouse Network - 2023
Global Lighthouse Network - 2023
Marcio Venturelli
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Haris Chughtai
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathon
rohitasare71
panel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdf
AmirStern2
5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf
Moreyeahs
IASW Drawings Final.pdf
IASW Drawings Final.pdf
ehclark63
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Inflectra
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7
MichaelCalabrese20
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
DianaGray10
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Haris Chughtai
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021
Marcio Venturelli
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
AmirStern2
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
Haris Chughtai
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdf
samsung664872
Analysis of algorithms
Analysis of algorithms
Asen Bozhilov
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App Design
DianaGray10
top 5 world's richest countries
top 5 world's richest countries
AngelTalosig2
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
corphedge274
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
WriteMe
Green flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdf
GoogleDeveloperStude22
Recently uploaded
(20)
Global Lighthouse Network - 2023
Global Lighthouse Network - 2023
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathon
panel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf
IASW Drawings Final.pdf
IASW Drawings Final.pdf
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdf
Analysis of algorithms
Analysis of algorithms
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App Design
top 5 world's richest countries
top 5 world's richest countries
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
Green flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdf
linux security: interact with linux
1.
Interact with Linux
Deep [in[security knowledge y3dips@echo.or.id
2.
GNU/Linux? • Ever heard
linux? • Ever heard GNU? • So, Please explain GNU/Linux?
3.
Please, Met Tux!
4.
Security • Why do
we need security? • Securing what? • How to do that?
5.
Physicalenvirontment Secure the Security
6.
{Physical Security • Room
Security (lock) • CPU security (locak case, no cdrom… else)_ • Bios Security Disallow booting from floppy/cdrom/usb drive and network
Report as inappropriate
Select your reason for reporting this presentation as inappropriate.*
Defamatory
Extremely Violent or Promotes Terrorism
Hate Speech
Offensive Language or Threatening
Pornographic
Spam or Scam
*Required
Flag
Copyright Complaint
13 likes
Show More
views
Total views
1,344
On Slideshare
0
From embeds
0
Number of embeds
0
This saved item is also in a list.
Removing from saved will also delete the item from your lists
Cancel
Delete
Add to a new list
What would you like to name this list?*
Make list private
Cancel
Save