Friday, January 25, 2013

Unix/linux Security Technologies

On the new(prenominal) hand , the chroot environment is employ as a bear witness environment for programs that would driving force problems if installed directly on the production administration (Ray , 2001 . This application is mainly used in software developing organizations in to eliminate the risk of re-installing programs and appli9cations that exponent some otherwise crash the entire system . Chrootjail thusly acts as a `prison for some applications that can not be installed directly on the system as it may cause other failures of the system on the other hand , this application ca n be used to recover other applications on the system when the system is unbooted (Toxen , 2002 . The chroot mechanism can in any case be used to running play applications and even programs that have been downloaded from the net profit since some downloads might be very dangerous to test directly on the system as it may extrapolate the functionality and efficiency of the system , therefore it is imperative for the user to test this application in an enclosed environment (chroot environment ) to nullify unwanted programs like viruses that would affect the efficiency of the entire system .
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
This application is used to secure the operating systemIPtablesIptabes is an application intentional to build firewalls and other internet filters . It filters unwanted applications from being accessed by users , also commonly known as intrusion breastplate as it prevents users from intruding into unauthorized system or other applications . It contains four tables and each of these tables has its own specific purposes . This application therefore filters or protects unwanted applications from intruding into the system . It is mostly used in most organizations to prevent users from accessing sites that are unauthorized . On the other hand , if an individual accesses unauthorized sites or applications in an organization , the user can be traced by the modulation tracking system contained in...If you want to get a encompassing essay, order it on our website: Orderessay

If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment