Tagged articles
6 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2026 · Information Security

Why Sharing a Root Account Is a Critical Security Risk and How to Replace It

The article analyzes the severe security, audit, and operational problems caused by using a shared root account on Linux servers, illustrates real incidents, and provides detailed migration steps, sudo‑based alternatives, audit‑d configurations, and bastion‑host solutions to enforce least‑privilege access.

Bastion HostPrivilege ManagementRoot Account
0 likes · 31 min read
Why Sharing a Root Account Is a Critical Security Risk and How to Replace It
Open Source Linux
Open Source Linux
Apr 3, 2023 · Fundamentals

Why Use sudo Instead of Root? Understanding Linux Privilege Management

This tutorial explains the differences between the root account and the sudo command on Linux, covering root privileges, sudo usage, the sudoers configuration file, and why employing sudo follows the principle of least privilege for safer system administration.

$rootPrivilege ManagementSystem Administration
0 likes · 8 min read
Why Use sudo Instead of Root? Understanding Linux Privilege Management
ITPUB
ITPUB
Feb 29, 2020 · Information Security

What the Weimeng Database Deletion Reveals About Backup and Permission Strategies

The article analyzes the recent Weimeng data‑loss incident, explains why recovery took 36 hours, highlights insider abuse, and offers a practical guide for small and large teams covering reliable backups, minimal‑privilege management, and cloud‑based disaster‑recovery solutions.

Database SecurityPrivilege Managementbackup strategy
0 likes · 9 min read
What the Weimeng Database Deletion Reveals About Backup and Permission Strategies
Efficient Ops
Efficient Ops
Mar 28, 2019 · Information Security

How Leading Tech Companies Audit and Control Ops Permissions

This article explains how large enterprises such as BAT and banks implement strict auditing and supervision of operational privileges, using personal accounts, command logging, OSSEC monitoring, firewall limits, and cross‑team oversight to enforce the principle of least privilege.

DevOpsOperationsPrivilege Management
0 likes · 6 min read
How Leading Tech Companies Audit and Control Ops Permissions
Efficient Ops
Efficient Ops
May 4, 2016 · Operations

How to Build a Scalable OpenLDAP‑Based Unified Identity System for Enterprise Operations

This article walks through the evolution of a unified identity authentication system built on OpenLDAP, covering initial password‑management pain points, design decisions involving PAM and sudo, role‑based access control, multi‑IDC distributed deployment, security hardening with TLS and anti‑brute‑force measures, and practical host‑restriction techniques for reliable, secure operations.

Identity ManagementOpenLDAPPrivilege Management
0 likes · 15 min read
How to Build a Scalable OpenLDAP‑Based Unified Identity System for Enterprise Operations
ITPUB
ITPUB
Nov 11, 2015 · Information Security

Essential Steps to Secure MySQL: From Access Controls to Patch Management

This guide outlines practical MySQL hardening techniques—including restricting remote access, regular backups, disabling unsafe features, managing root credentials, removing test databases, and applying security patches—to protect data integrity and prevent unauthorized intrusion.

BackupDatabase SecurityPrivilege Management
0 likes · 11 min read
Essential Steps to Secure MySQL: From Access Controls to Patch Management