In this video, learn how to enforce strong passwords using pam_pwquality.so. Also, explore how to control password history with pam_pwhistory.so.
- [Narrator] Before we go any further,…I wanna talk about the three different types of accounts…that are found on a Linux system.…The most powerful account on a Linux system…is the root account, also known as the super user.…Root can do anything.…If you're logged into the root account,…you can see all the files on the system,…you can install or remove software,…you can change the network configuration,…you can create, modify, and delete users,…and everything else you can do on a Linux system.…This special account always has a UID or a user ID of zero.…
The account name like root or Jason…is just for the convenience of us humans.…The Linux system doesn't care about account names.…It looks at the UID of an account.…This is an important concept, because if I were to set…the UID of another account on the system to be zero,…then that account would have super user privileges,…because the Linux system looks at…the UID not the account name.…All other accounts on the system…that do not have a UID of zero are normal accounts.…
Author
Released
6/11/2018- What makes Linux secure?
- Physical security concepts
- Encrypting new and existing devices
- Account and network security
- Linux firewall fundamentals
- File system security
- File and directory permissions
- ACLs and rootkits
Skill Level Intermediate
Duration
Views
Related Courses
-
Linux: Bash Shell and Scripts
with Kevin Dankwardt2h 46m Intermediate -
Building an Ubuntu Home Server
with Scott Simpson2h 16m Beginner
-
Introduction
-
Welcome1m 25s
-
-
1. General Security
-
General security1m 9s
-
Is Linux secure?2m 26s
-
What makes Linux secure?8m 18s
-
-
2. Physical Security
-
Physical security concepts7m 41s
-
Single user mode security6m 45s
-
Secure the bootloader6m 57s
-
Disk encryption5m 34s
-
Encrypt a new device: Part 18m 38s
-
Encrypt a new device: Part 24m 17s
-
Disable Control-Alt-Delete1m 44s
-
3. Account Security
-
Account security45s
-
Introduction to PAM5m 13s
-
Password security7m 58s
-
Control account access5m 6s
-
Security by account type6m 1s
-
Account security: Demo 22m 44s
-
-
4. Network Security
-
Network security35s
-
Network security: Part 17m 54s
-
Network security: Part 26m 20s
-
Secure SSHD: Part 17m 52s
-
Secure SSHD: Part 23m 15s
-
Linux firewall fundamentals7m 36s
-
Firewall rule specifications4m 43s
-
Example firewall rules3m 59s
-
Linux firewall demo9m 47s
-
TCP Wrappers: Part 17m 2s
-
TCP Wrappers: Part 24m 2s
-
-
5. File System Security
-
File system security1m 2s
-
Special modes: Part 17m 55s
-
Special modes: Part 23m 4s
-
File attributes6m 5s
-
File attributes demo2m 48s
-
ACLs9m 25s
-
ACLs demo6m 13s
-
Rootkits8m 33s
-
Rootkit hunter demo7m 12s
-
-
Conclusion
-
Summary4m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Password security