158:
542:
1263:
220:
63:
22:
1275:
417:
480:
Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not
428:
account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account is
527:
protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.
661:
481:
have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the
424:
Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a
671:
679:
73:
656:
383:
permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different
284:
131:
256:
103:
1301:
624:
321:
303:
263:
201:
179:
110:
49:
172:
1321:
513:
684:
1306:
785:
706:
270:
241:
237:
117:
88:
35:
1316:
501:
There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the
395:
Many Unix implementations add an additional layer of security by requiring that a user be a member of the
252:
99:
1244:
1050:
954:
909:
551:
1238:
1193:
824:
939:
166:
401:
372:
366:
230:
1084:
183:
1172:
1279:
1232:
437:
program is more commonly used), so usage of the root account can be more closely monitored.
617:
UNIX Administration: A Comprehensive
Sourcebook for Effective Systems and Network Management
457:
On many UNIX systems, user and password information, if stored locally, can be found in the
1227:
1130:
277:
124:
8:
1144:
726:
558:
Please help update this article to reflect recent events or newly available information.
1159:
699:
509:
486:
84:
41:
1165:
737:
620:
482:
397:
338:
772:
722:
524:
380:
349:
752:
747:
742:
714:
665:
376:
1005:
1311:
1295:
1267:
1112:
1103:
966:
817:
692:
594:
like operating systems may provide their own native functionality and other
934:
929:
1200:
1011:
595:
502:
1221:
1118:
1025:
1000:
944:
914:
762:
1056:
719:
583:
556:. The reason given is: Iptables is no longer the "current interface".
425:
346:
646:
Simson
Garfinkel and Gene Spafford, O'Reilly & Associates, 2003.
219:
80:
62:
1214:
1066:
1032:
919:
874:
859:
587:
575:
451:
1207:
1186:
1179:
1017:
983:
854:
839:
812:
802:
416:
1154:
1073:
949:
924:
888:
844:
807:
796:
458:
1124:
1091:
1078:
988:
900:
881:
867:
829:
579:
490:
454:
and guarding them properly are important for Unix security.
420:
Sudo command on Ubuntu to temporarily assume root privileges
994:
977:
849:
715:
591:
434:
342:
379:
have permissions set enabling different access to a file.
1097:
1061:
834:
658:
The Unix
Security Model for web server administration
440:
578:is the current user interface for interacting with
244:. Unsourced material may be challenged and removed.
673:An Architectural Overview of UNIX Network Security
554:may be compromised due to out-of-date information
1293:
371:A core security feature in these systems is the
493:based checksum, or the use of read-only media.
700:
496:
89:introducing citations to additional sources
50:Learn how and when to remove these messages
707:
693:
322:Learn how and when to remove this message
304:Learn how and when to remove this message
202:Learn how and when to remove this message
415:
165:This article includes a list of general
79:Relevant discussion may be found on the
470:
1294:
387:have different permissions on a file.
688:
644:Practical UNIX and Internet Security,
1274:
614:
535:
242:adding citations to reliable sources
213:
151:
56:
15:
608:
13:
441:User and administrative techniques
433:used for day to day purposes (the
355:
171:it lacks sufficient corresponding
14:
1333:
650:
31:This article has multiple issues.
1273:
1262:
1261:
540:
218:
156:
72:relies largely or entirely on a
61:
20:
1260:indicate discontinued systems.
229:needs additional citations for
39:or discuss these issues on the
411:
390:
360:
1:
601:
586:functionality. It replaced
519:
512:for UNIX-like systems, from
445:
7:
1245:Windows Subsystem for Linux
531:
475:
10:
1338:
637:
619:. CRC Press. p. 207.
497:Viruses and virus scanners
364:
1302:Operating system security
1253:
1239:Windows Services for UNIX
1194:Microsoft POSIX subsystem
1143:
1042:
963:
898:
782:
771:
733:
598:firewall products exist.
375:. All files in a typical
676:Robert B. Reinhardt 1993
505:—targeted Unix systems.
1322:Linux security software
404:in order to access the
373:file system permissions
367:File system permissions
337:refers to the means of
186:more precise citations.
615:Levi, Bozidar (2002).
421:
1307:System administration
1233:UserLAnd Technologies
668:Robert K. Moniot 2000
419:
402:user privileges group
1317:Linux administration
1228:UNIX System Services
727:compatibility layers
680:Unix security papers
471:Software maintenance
238:improve this article
85:improve this article
955:Other distributions
664:2006-10-04 at the
487:cryptographic hash
422:
1289:
1288:
1139:
1138:
723:operating systems
573:
572:
483:digital signature
450:Selecting strong
332:
331:
324:
314:
313:
306:
288:
212:
211:
204:
150:
149:
135:
54:
1329:
1277:
1276:
1265:
1264:
780:
779:
709:
702:
695:
686:
685:
631:
630:
612:
568:
565:
559:
552:factual accuracy
544:
543:
536:
525:Network firewall
514:multiple vendors
466:
461:
407:
381:Unix permissions
350:operating system
327:
320:
309:
302:
298:
295:
289:
287:
246:
222:
214:
207:
200:
196:
193:
187:
182:this article by
173:inline citations
160:
159:
152:
145:
142:
136:
134:
93:
65:
57:
46:
24:
23:
16:
1337:
1336:
1332:
1331:
1330:
1328:
1327:
1326:
1292:
1291:
1290:
1285:
1249:
1146:
1135:
1038:
959:
894:
774:
767:
729:
713:
666:Wayback Machine
653:
640:
635:
634:
627:
613:
609:
604:
569:
563:
560:
557:
549:This section's
545:
541:
534:
522:
499:
478:
473:
464:
459:
448:
443:
414:
405:
393:
377:Unix filesystem
369:
363:
358:
356:Design concepts
328:
317:
316:
315:
310:
299:
293:
290:
253:"Unix security"
247:
245:
235:
223:
208:
197:
191:
188:
178:Please help to
177:
161:
157:
146:
140:
137:
100:"Unix security"
94:
92:
78:
66:
25:
21:
12:
11:
5:
1335:
1325:
1324:
1319:
1314:
1309:
1304:
1287:
1286:
1284:
1283:
1271:
1254:
1251:
1250:
1248:
1247:
1242:
1235:
1230:
1225:
1218:
1211:
1204:
1197:
1190:
1183:
1176:
1169:
1162:
1157:
1151:
1149:
1141:
1140:
1137:
1136:
1134:
1133:
1128:
1121:
1116:
1109:
1108:
1107:
1095:
1088:
1081:
1076:
1071:
1070:
1069:
1059:
1054:
1046:
1044:
1040:
1039:
1037:
1036:
1029:
1022:
1021:
1020:
1015:
1003:
998:
991:
986:
981:
973:
971:
961:
960:
958:
957:
952:
947:
942:
937:
932:
927:
922:
917:
912:
906:
904:
896:
895:
893:
892:
885:
878:
871:
864:
863:
862:
857:
852:
847:
842:
837:
832:
822:
821:
820:
815:
810:
805:
792:
790:
777:
769:
768:
766:
765:
760:
755:
750:
745:
740:
734:
731:
730:
712:
711:
704:
697:
689:
683:
682:
677:
669:
652:
651:External links
649:
648:
647:
639:
636:
633:
632:
625:
606:
605:
603:
600:
571:
570:
548:
546:
539:
533:
530:
521:
518:
510:virus scanners
498:
495:
477:
474:
472:
469:
447:
444:
442:
439:
413:
410:
392:
389:
365:Main article:
362:
359:
357:
354:
330:
329:
312:
311:
294:September 2014
226:
224:
217:
210:
209:
164:
162:
155:
148:
147:
83:. Please help
69:
67:
60:
55:
29:
28:
26:
19:
9:
6:
4:
3:
2:
1334:
1323:
1320:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1299:
1297:
1282:
1281:
1272:
1270:
1269:
1259:
1256:
1255:
1252:
1246:
1243:
1241:
1240:
1236:
1234:
1231:
1229:
1226:
1224:
1223:
1219:
1217:
1216:
1212:
1210:
1209:
1205:
1203:
1202:
1198:
1196:
1195:
1191:
1189:
1188:
1184:
1182:
1181:
1177:
1175:
1174:
1170:
1168:
1167:
1163:
1161:
1158:
1156:
1153:
1152:
1150:
1148:
1145:Compatibility
1142:
1132:
1129:
1127:
1126:
1122:
1120:
1117:
1115:
1114:
1113:Research Unix
1110:
1106:
1105:
1104:BlackBerry 10
1101:
1100:
1099:
1096:
1094:
1093:
1089:
1087:
1086:
1082:
1080:
1077:
1075:
1072:
1068:
1065:
1064:
1063:
1060:
1058:
1055:
1053:
1052:
1048:
1047:
1045:
1041:
1035:
1034:
1030:
1028:
1027:
1023:
1019:
1016:
1014:
1013:
1009:
1008:
1007:
1004:
1002:
999:
997:
996:
992:
990:
987:
985:
982:
980:
979:
975:
974:
972:
970:
969:
968:
962:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
911:
908:
907:
905:
903:
902:
897:
891:
890:
886:
884:
883:
879:
877:
876:
872:
870:
869:
865:
861:
858:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
827:
826:
823:
819:
818:DragonFly BSD
816:
814:
811:
809:
806:
804:
801:
800:
799:
798:
794:
793:
791:
789:
788:
787:
781:
778:
776:
770:
764:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
735:
732:
728:
724:
721:
717:
710:
705:
703:
698:
696:
691:
690:
687:
681:
678:
675:
674:
670:
667:
663:
660:
659:
655:
654:
645:
642:
641:
628:
626:0-8493-1351-1
622:
618:
611:
607:
599:
597:
593:
589:
585:
581:
577:
567:
555:
553:
547:
538:
537:
529:
526:
517:
515:
511:
506:
504:
494:
492:
488:
484:
468:
462:
455:
453:
438:
436:
432:
427:
418:
409:
403:
400:
399:
388:
386:
382:
378:
374:
368:
353:
351:
348:
344:
340:
336:
335:Unix security
326:
323:
308:
305:
297:
286:
283:
279:
276:
272:
269:
265:
262:
258:
255: –
254:
250:
249:Find sources:
243:
239:
233:
232:
227:This article
225:
221:
216:
215:
206:
203:
195:
185:
181:
175:
174:
168:
163:
154:
153:
144:
133:
130:
126:
123:
119:
116:
112:
109:
105:
102: –
101:
97:
96:Find sources:
90:
86:
82:
76:
75:
74:single source
70:This article
68:
64:
59:
58:
53:
51:
44:
43:
38:
37:
32:
27:
18:
17:
1278:
1266:
1257:
1237:
1220:
1213:
1206:
1199:
1192:
1185:
1178:
1171:
1164:
1123:
1111:
1102:
1090:
1083:
1049:
1031:
1024:
1010:
993:
976:
965:
964:
899:
887:
880:
873:
866:
795:
784:
783:
757:
738:Architecture
672:
657:
643:
616:
610:
574:
564:January 2014
561:
550:
523:
507:
500:
489:, such as a
479:
456:
449:
430:
423:
396:
394:
384:
370:
334:
333:
318:
300:
291:
281:
274:
267:
260:
248:
236:Please help
231:verification
228:
198:
189:
170:
138:
128:
121:
114:
107:
95:
71:
47:
40:
34:
33:Please help
30:
1201:MKS Toolkit
1012:OpenSolaris
596:open source
503:Morris worm
467:file pair.
465:/etc/shadow
460:/etc/passwd
412:Root access
391:User groups
385:user groups
361:Permissions
184:introducing
1296:Categories
1222:PWS/VSE-AF
1119:SerenityOS
1026:Tru64 UNIX
1001:OpenServer
753:Philosophy
743:Filesystem
602:References
508:There are
264:newspapers
192:April 2024
167:references
141:April 2024
111:newspapers
36:improve it
1057:Domain/OS
773:Operating
720:Unix-like
590:. Other
584:netfilter
520:Firewalls
452:passwords
446:Passwords
408:command.
347:Unix-like
81:talk page
42:talk page
1268:Category
1215:P.I.P.S.
1051:Coherent
1033:UnixWare
967:System V
920:ChromeOS
875:NeXTSTEP
860:bridgeOS
758:Security
662:Archived
588:ipchains
576:iptables
532:iptables
476:Patching
339:securing
1280:Commons
1258:Italics
1187:MachTen
1180:Interix
1160:Darling
1131:more...
1018:Illumos
1006:Solaris
940:Red Hat
910:Android
855:watchOS
840:audioOS
813:OpenBSD
803:FreeBSD
775:systems
748:History
638:General
582:kernel
491:SHA-256
278:scholar
180:improve
125:scholar
1166:Eunice
1155:Cygwin
1147:layers
1074:LynxOS
950:Ubuntu
935:Gentoo
930:Fedora
925:Debian
889:Ultrix
845:iPadOS
825:Darwin
808:NetBSD
797:386BSD
623:
431:seldom
280:
273:
266:
259:
251:
169:, but
127:
120:
113:
106:
98:
1125:Xenix
1092:OSF/1
1079:Minix
1043:Other
989:HP-UX
901:Linux
882:SunOS
868:DYNIX
830:macOS
763:Shell
580:Linux
485:of a
398:wheel
285:JSTOR
271:books
132:JSTOR
118:books
1312:Unix
1208:PASE
1067:Hurd
995:IRIX
978:A/UX
945:SUSE
915:Arch
850:tvOS
725:and
718:and
716:Unix
621:ISBN
592:Unix
463:and
435:sudo
426:root
343:Unix
257:news
104:news
1173:GNV
1098:QNX
1085:MOS
1062:GNU
984:AIX
835:iOS
786:BSD
345:or
240:by
87:by
1298::
516:.
406:su
352:.
341:a
45:.
708:e
701:t
694:v
629:.
566:)
562:(
325:)
319:(
307:)
301:(
296:)
292:(
282:·
275:·
268:·
261:·
234:.
205:)
199:(
194:)
190:(
176:.
143:)
139:(
129:·
122:·
115:·
108:·
91:.
77:.
52:)
48:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.