Tagged articles
51 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 2, 2026 · Information Security

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

This article walks operations engineers through the most frequent security‑configuration problems encountered during Grade‑Protection (等保) remediation, detailing the regulatory background, specific compliance gaps, step‑by‑step remediation commands for Linux systems, verification methods, FAQs, and a practical implementation workflow.

AuditdGrade ProtectionLinux Hardening
0 likes · 28 min read
Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation
Cloud Native Technology Community
Cloud Native Technology Community
Apr 24, 2026 · Cloud Native

Kubernetes v1.36 “Haru”: Why Some Changes Aren’t Worth the Wait

Kubernetes v1.36 focuses on clearing technical debt rather than adding flashy features, retiring ingress‑nginx, tightening kubelet API auth, optimizing SELinux mounts, externalizing ServiceAccount token signing, expanding DRA for GPU scheduling, graduating MutatingAdmissionPolicy, and removing long‑standing legacy components, all accompanied by a concrete upgrade checklist.

DRAKubernetesMutatingAdmissionPolicy
0 likes · 15 min read
Kubernetes v1.36 “Haru”: Why Some Changes Aren’t Worth the Wait
MaGe Linux Operations
MaGe Linux Operations
Mar 26, 2026 · Operations

How to Diagnose and Fix Port Connectivity Issues on Linux Servers

This guide walks you through the root causes of "port unreachable" problems, explains TCP and UDP handshakes, and provides a seven‑layer troubleshooting framework with concrete commands, scripts, case studies, best‑practice recommendations, and monitoring setups for Linux environments.

SELinuxTCPUDP
0 likes · 37 min read
How to Diagnose and Fix Port Connectivity Issues on Linux Servers
MaGe Linux Operations
MaGe Linux Operations
Feb 12, 2026 · Information Security

Master Linux Permissions: From chmod Basics to Advanced ACL, SELinux & Containers

This comprehensive guide walks you through Linux's multi‑layered permission system—covering basic UGO rwx bits, numeric and symbolic modes, special bits, ACLs, SELinux/AppArmor, capabilities, chattr attributes, and container‑level controls such as SecurityContext and Pod Security Standards—so you can design a robust, least‑privilege security model for servers and cloud workloads.

ACLDockerPermissions
0 likes · 34 min read
Master Linux Permissions: From chmod Basics to Advanced ACL, SELinux & Containers
Ops Community
Ops Community
Jan 6, 2026 · Information Security

Master Linux Permissions: From Basics to Advanced Security Practices

This comprehensive guide walks you through the evolution, fundamentals, and advanced techniques of Linux permission management, covering UGO models, special bits, ACLs, SELinux/AppArmor, best‑practice design principles, troubleshooting steps, audit configurations, and real‑world case studies for securing web, database, and SSH services.

ACLLinuxPermissions
0 likes · 39 min read
Master Linux Permissions: From Basics to Advanced Security Practices
Liangxu Linux
Liangxu Linux
Nov 2, 2025 · Information Security

Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management

This guide walks you through practical Linux hardening techniques, covering firewalld's zone‑based and rich‑rule configurations, IPSET management, SELinux context fundamentals, custom policy creation, automation scripts, monitoring, common pitfalls, performance tips, and validation methods to build a multi‑layered defense.

LinuxSELinuxSystem Administration
0 likes · 11 min read
Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management
Liangxu Linux
Liangxu Linux
Oct 26, 2025 · Information Security

Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management

This guide presents a production‑tested Linux hardening strategy that combines advanced firewalld zone and rich‑rule configurations with precise SELinux context management, offering step‑by‑step commands, custom scripts, troubleshooting tips, and performance optimizations to protect servers from the majority of common attacks.

AutomationLinuxSELinux
0 likes · 10 min read
Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management
Raymond Ops
Raymond Ops
Sep 25, 2025 · Information Security

Boost Linux Security: Essential Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account locking, password policies, SELinux activation, SSH port changes, firewall minimization, immutable system files, and other measures to elevate the system to a higher security level.

LinuxPassword policyRHEL7
0 likes · 13 min read
Boost Linux Security: Essential Hardening Steps for RHEL 7
Ops Community
Ops Community
Sep 2, 2025 · Information Security

Mastering SELinux in Production: A Complete Security Configuration Guide

This comprehensive guide walks you through SELinux fundamentals, core concepts, mode differences, security contexts, real‑world configuration examples for web and database services, boolean management, troubleshooting techniques, performance tuning, and enterprise‑grade best practices to turn SELinux into a reliable production‑level security guardian.

Linux securitySELinuxSystem Hardening
0 likes · 16 min read
Mastering SELinux in Production: A Complete Security Configuration Guide
Open Source Linux
Open Source Linux
Aug 22, 2025 · Information Security

Advanced Linux Security Hardening: firewalld Rules & SELinux Contexts

Learn how to fortify Linux servers by mastering firewalld's advanced zone and rich‑rule configurations, leveraging IPSET for large address sets, and managing SELinux contexts and custom policies, with practical scripts, troubleshooting tips, and production‑grade best practices to achieve multi‑layered protection.

LinuxSELinuxSystem Administration
0 likes · 11 min read
Advanced Linux Security Hardening: firewalld Rules & SELinux Contexts
Ops Community
Ops Community
Aug 19, 2025 · Information Security

Master Linux Security: Advanced firewalld Rules & SELinux Context Management

This guide walks you through hardening Linux servers by using firewalld's zone‑based advanced rules, rich rules, and IPSET collections, combined with precise SELinux context management, practical scripts, troubleshooting tips, and production‑grade best practices to build a multi‑layered defense.

AutomationLinuxSELinux
0 likes · 11 min read
Master Linux Security: Advanced firewalld Rules & SELinux Context Management
Linux Kernel Journey
Linux Kernel Journey
Jun 12, 2025 · Information Security

In‑Depth Analysis of JuiceFS Permission Management: Full Compatibility with Linux Security Mechanisms

This article thoroughly examines how JuiceFS, a FUSE‑based distributed file system, aligns with Linux's discretionary and mandatory access control models, implements Unix permissions, POSIX ACLs, special permission bits, capability handling, and SELinux integration, while detailing practical configurations such as SDK access, root‑squash, all‑squash, and optimized ACL storage.

CapabilityJuiceFSLinux permissions
0 likes · 16 min read
In‑Depth Analysis of JuiceFS Permission Management: Full Compatibility with Linux Security Mechanisms
Raymond Ops
Raymond Ops
Apr 16, 2025 · Information Security

Boost Linux Server Security: Practical Hardening Steps for RHEL7

This guide walks through a comprehensive Linux hardening checklist for RHEL7, covering account locking, password policies, SSH port changes, SELinux activation, firewall tightening, and file attribute protections to elevate the system to a B1 security level.

HardeningLinuxRHEL7
0 likes · 12 min read
Boost Linux Server Security: Practical Hardening Steps for RHEL7
Liangxu Linux
Liangxu Linux
Apr 13, 2025 · Operations

Boost Linux Server Performance: Essential Kernel and Sysctl Tweaks

This guide explains how to permanently disable SELinux, set the system runlevel, enlarge file descriptor limits, fine‑tune kernel networking parameters via /etc/sysctl.conf, configure firewall settings, and troubleshoot common Linux socket errors to significantly improve server performance.

LinuxNetwork SettingsSELinux
0 likes · 7 min read
Boost Linux Server Performance: Essential Kernel and Sysctl Tweaks
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account lockdown, password policies, SELinux activation, SSH port changes, login restrictions, file immutability, compiler and log protection, and minimal firewall rules to elevate the system to a higher security level.

RHEL7SELinuxSSH
0 likes · 12 min read
How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2025 · Information Security

How to Harden Linux Systems: Practical Security Steps for RHEL7

An in‑depth guide shows how to harden a RHEL 7 Linux server by tightening account permissions, enforcing password policies, limiting login attempts, changing SSH settings, restricting compiler use, protecting log files, applying minimal firewall rules, and enabling SELinux to achieve a B1‑level security baseline.

HardeningRHEL7SELinux
0 likes · 13 min read
How to Harden Linux Systems: Practical Security Steps for RHEL7
System Architect Go
System Architect Go
Oct 11, 2024 · Information Security

How Kubernetes Secures Pods with Seccomp, AppArmor, and SELinux

This article explains how Kubernetes leverages the Linux kernel security mechanisms Seccomp, AppArmor, and SELinux together with Pod Security Standards and the built‑in admission controller to enforce fine‑grained security policies for container workloads in cloud‑native environments.

AppArmorCloud NativeKubernetes
0 likes · 8 min read
How Kubernetes Secures Pods with Seccomp, AppArmor, and SELinux
Liangxu Linux
Liangxu Linux
Sep 5, 2024 · Information Security

Hardening RHEL7: Practical Linux Security Steps and Commands

This guide walks through comprehensive Linux security hardening on RHEL7, covering account lockout, password policies, SELinux configuration, SSH port changes, root login disabling, umask restriction, immutable system files, GCC limitation, log protection, minimal firewall rules, and related command examples.

LinuxPassword policyRHEL7
0 likes · 13 min read
Hardening RHEL7: Practical Linux Security Steps and Commands
Liangxu Linux
Liangxu Linux
Jul 18, 2024 · Information Security

How to Harden RHEL7: Essential Linux Security Hardening Steps

This guide walks through practical Linux security hardening on RHEL7, covering TCSEC security levels, account lockdown, password policies, SSH hardening, SELinux activation, firewall minimization, immutable system files, and other configuration tweaks to raise the system to a B1 security rating.

LinuxRHEL7SELinux
0 likes · 12 min read
How to Harden RHEL7: Essential Linux Security Hardening Steps
MaGe Linux Operations
MaGe Linux Operations
Jul 2, 2024 · Information Security

How to Harden RHEL7: Essential Linux Security Configurations

This guide walks through practical steps to harden a RHEL7 Linux server—including account restrictions, password policies, SELinux enforcement, SSH port changes, firewall rules, and file attribute protections—using concrete commands and configuration edits to boost system security.

LinuxRHEL7SELinux
0 likes · 13 min read
How to Harden RHEL7: Essential Linux Security Configurations
DevOps Operations Practice
DevOps Operations Practice
Mar 6, 2024 · Information Security

Comprehensive Linux System Hardening Guide for Production Environments

This guide details practical Linux hardening steps—including disabling SELinux, trimming startup services, applying the principle of least privilege, configuring sudo, synchronizing time, adjusting file descriptor limits, locking critical files, disabling ping, optimizing SSH, changing hostnames, and preventing destructive rm commands—to improve security and stability in production deployments.

LinuxSELinuxSudo
0 likes · 12 min read
Comprehensive Linux System Hardening Guide for Production Environments
Liangxu Linux
Liangxu Linux
May 23, 2023 · Information Security

Comprehensive Guide to Linux Security Mechanisms Across Hardware, Kernel, and Application Layers

Linux’s open architecture offers a rich set of security mechanisms spanning hardware, firmware, CPU features, kernel protections, and application‑level tools, and this guide systematically outlines each layer’s attack surface and corresponding defenses, from BIOS and TPM to SELinux, cgroups, and network hardening.

HardeningLinuxSELinux
0 likes · 17 min read
Comprehensive Guide to Linux Security Mechanisms Across Hardware, Kernel, and Application Layers
Liangxu Linux
Liangxu Linux
May 14, 2023 · Information Security

Why SELinux Matters: How It Works and When (Not) to Disable It

This guide explains what SELinux is, how its mandatory access control policies enforce security, the risks of disabling it, and provides step‑by‑step instructions for turning it off on CentOS while suggesting the permissive mode as a safer alternative.

CentOSLinux securitySELinux
0 likes · 4 min read
Why SELinux Matters: How It Works and When (Not) to Disable It
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Feb 17, 2023 · Mobile Development

Optimizing Dynamically Loaded Dex Files Across Android Versions

The article explains how dynamically loaded dex files are optimized on Android 5.0 through 12—detailing AOT compilation via dex2oat, profile‑guided filters, runtime‑filter flags, class‑loader contexts, SELinux limits, and the use of PathClassLoader or the PMS performDexOptSecondary command to achieve performance comparable to installed APKs.

AndroidAoTDex Optimization
0 likes · 17 min read
Optimizing Dynamically Loaded Dex Files Across Android Versions
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jul 29, 2022 · Information Security

How Android’s Binder Uses SELinux to Enforce Secure IPC Permissions

This article examines Android’s Binder inter‑process communication mechanism, detailing how SELinux integrates with the /dev/binder driver, the role of ServiceManager as ContextManager, the definition of binder‑related permissions, and the kernel‑level security hooks that enforce SEAndroid checks during binder transactions.

AndroidBinderIPC
0 likes · 20 min read
How Android’s Binder Uses SELinux to Enforce Secure IPC Permissions
Open Source Linux
Open Source Linux
Feb 9, 2022 · Information Security

How to Safely Disable SELinux on CentOS: Step‑by‑Step Guide

This guide explains why and how to disable SELinux on CentOS, covering status checks, temporary and permanent disabling methods, necessary configuration file edits, and verification steps to ensure the system runs without SELinux enforcement.

CentOSDisable SELinuxLinux security
0 likes · 5 min read
How to Safely Disable SELinux on CentOS: Step‑by‑Step Guide
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 29, 2021 · Information Security

Linux Security Module (LSM) Fundamentals and Implementation

The article explains the Linux Security Module (LSM) framework, detailing its origins, hook‑based architecture, kernel integration points, initialization process, and how it enables flexible, non‑intrusive security enhancements such as SELinux, allowing multiple security modules to coexist within the Linux kernel.

AppArmorKernel SecurityLSM
0 likes · 9 min read
Linux Security Module (LSM) Fundamentals and Implementation
ByteDance Dali Intelligent Technology Team
ByteDance Dali Intelligent Technology Team
Oct 20, 2021 · Mobile Development

Bypassing Android dex2oat Restrictions for targetSdkVersion ≥ 29: Analysis and Implementation

This article investigates the Android dex2oat compilation restrictions introduced for targetSdkVersion ≥ 29, analyzes their impact on app performance, explores SELinux enforcement, and presents a practical solution using system commands and binder calls to trigger dex2oat compilation for both primary and secondary APKs, improving load and runtime speed.

APKAndroidCompilation
0 likes · 19 min read
Bypassing Android dex2oat Restrictions for targetSdkVersion ≥ 29: Analysis and Implementation
ByteDance Terminal Technology
ByteDance Terminal Technology
Sep 29, 2021 · Mobile Development

Bypassing Android 10+ dex2oat Restrictions for Performance Optimization

This technical article investigates the Android 10+ dex2oat limitation that blocks app‑initiated compilation, analyzes its SELinux enforcement, and presents a practical solution using system commands and binder calls to trigger dex2oat for both primary and secondary APKs, achieving significant load‑time and runtime improvements.

ADBAndroidMobile
0 likes · 20 min read
Bypassing Android 10+ dex2oat Restrictions for Performance Optimization
Open Source Linux
Open Source Linux
Jun 23, 2021 · Operations

Mastering Samba on Linux: Install, Configure, and Manage File Sharing

Learn how to install and configure Samba on Linux, covering the service’s history, required packages, daemon processes, main configuration file settings, command‑line tools, SELinux integration, and step‑by‑step client and server setup for Windows and Linux file sharing.

LinuxSELinuxSamba
0 likes · 15 min read
Mastering Samba on Linux: Install, Configure, and Manage File Sharing
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 4, 2021 · Information Security

Overview of SELinux and Its Use in Android

The article explains SELinux’s origins, core architecture, mandatory access control mechanisms such as type enforcement and MLS, and how Android incorporates SELinux as SEAndroid—detailing its evolution from permissive to enforcing mode, policy file structure, Android O’s split policies, and example domain and object transitions.

AndroidMacSELinux
0 likes · 17 min read
Overview of SELinux and Its Use in Android
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2021 · Information Security

Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts

This article explains how SELinux enforces mandatory access control on Linux, describes its three modes, shows how to view and modify SELinux contexts for MySQL processes and data directories, and provides step‑by‑step commands to add custom paths, logs, PID files, and ports while preserving system security.

Database AdministrationLinux securitySELinux
0 likes · 8 min read
Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2019 · Information Security

Boost Your Linux Security: Practical Commands Every Admin Should Know

This article walks you through essential Linux security techniques—console protection, password policies, sudo alerts, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux auditing tools—providing concrete commands and configurations to harden your system against evolving threats.

HardeningSELinuxSSH
0 likes · 17 min read
Boost Your Linux Security: Practical Commands Every Admin Should Know
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2018 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This comprehensive guide presents 25 practical Linux hardening techniques—from BIOS protection and disk partitioning to SELinux configuration, firewall rules, and user account management—helping system administrators strengthen server security and defend against potential attacks.

HardeningLinuxSELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2018 · Information Security

Essential Linux Security Hardening: 12 Practical Commands to Protect Your System

This article walks through twelve essential Linux security techniques—including console access restrictions, password aging, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, SELinux reporting, and sealert usage—providing commands and configuration tips to fortify a system.

HardeningLinuxSELinux
0 likes · 15 min read
Essential Linux Security Hardening: 12 Practical Commands to Protect Your System
MaGe Linux Operations
MaGe Linux Operations
Nov 17, 2018 · Information Security

Hardening Linux: Practical Commands to Boost System Security

This article presents a comprehensive guide on strengthening Linux systems by applying console restrictions, password policies, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux tools such as aureport and sealert.

HardeningLinuxSELinux
0 likes · 15 min read
Hardening Linux: Practical Commands to Boost System Security
Practical DevOps Architecture
Practical DevOps Architecture
Sep 6, 2017 · Information Security

Configuring SELinux and iptables on Red Hat/CentOS Systems

This guide explains how to permanently disable SELinux, temporarily change its mode, and provides a comprehensive tutorial on using iptables—including table concepts, basic commands, rule management, scripting, NAT configuration, and saving/restoring firewall rules—on Red Hat/CentOS Linux.

CentOSLinux securitySELinux
0 likes · 16 min read
Configuring SELinux and iptables on Red Hat/CentOS Systems
MaGe Linux Operations
MaGe Linux Operations
Apr 15, 2017 · Information Security

Boost Your Linux Security: Essential Commands and Best Practices

This article provides a comprehensive, step‑by‑step guide to hardening a Linux system, covering console restrictions, password policies, sudo alerts, SSH tuning, Tripwire intrusion detection, firewalld and iptables management, compiler restrictions, immutable files, SELinux auditing with aureport, and the sealert tool.

HardeningSELinuxSSH
0 likes · 14 min read
Boost Your Linux Security: Essential Commands and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

25 Essential Linux Hardening Tips to Boost System Security

Discover 25 practical Linux hardening techniques—from BIOS protection and minimal package installation to SELinux configuration, firewall rules, and user account management—that help system administrators strengthen security, prevent attacks, and maintain a resilient, well‑configured server environment.

HardeningPassword policySELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Boost System Security
ITPUB
ITPUB
Jan 30, 2017 · Information Security

How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More

This guide outlines practical techniques to improve Linux host security, covering BIOS password setup, disk encryption, boot directory protection, USB disabling, system updates, package cleanup, port scanning, SSH hardening, SELinux activation, network parameter tuning, password policies, and file permission hardening.

HardeningSELinuxSSH
0 likes · 14 min read
How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2016 · Information Security

Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall

This guide walks through hardening an Nginx web server on Linux by configuring default files, testing and reloading, enabling SELinux, mounting least‑privilege partitions, applying sysctl security parameters, removing unnecessary modules, and deploying an iptables‑based firewall with detailed command examples.

HardeningLinux securitySELinux
0 likes · 14 min read
Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall
ITPUB
ITPUB
Apr 11, 2016 · Operations

Quick Guide: Set Up Samba on Linux for Windows File Sharing

This step‑by‑step tutorial shows how to install Samba on a Linux server, configure a shared home directory, create a Samba user, adjust firewall and SELinux settings, and finally access the share from a Windows client.

ConfigurationLinuxSELinux
0 likes · 5 min read
Quick Guide: Set Up Samba on Linux for Windows File Sharing
MaGe Linux Operations
MaGe Linux Operations
Jul 8, 2014 · Information Security

Top 9 Essential Linux Security Practices Every Admin Should Implement

Securing Linux systems requires more than a single anti‑malware tool; this guide outlines nine practical measures—including SELinux, vulnerability alerts, service hardening, log monitoring, port knocking, iptables, default‑deny policies, IDS, and full‑disk encryption—to strengthen system defenses against attacks.

IDSLinuxPort Knocking
0 likes · 6 min read
Top 9 Essential Linux Security Practices Every Admin Should Implement