Go Back   2023 2024 Courses.Ind.In > Main Category > Main Forum

  #1  
Old November 29th, 2015, 11:26 AM
Super Moderator
 
Join Date: Apr 2013
Default Grsecurity

Discuss about grsecurity here. Welcome to Courses.ind.in and this page is for grsecurity discussion. If you are looking for information on grsecurity then ask your question is as much details as possible in the “Reply” box provided below. The more detailed your question will be, the more easy will it be for our experts to answers your query. And if you have any updated or latest information on grsecurity, then please share you knowledge with our experts in the “Reply” box below. Your reply will be published here and your knowledge can help many people. Thanks for stopping by at Courses.ind.in. Please visit again.
Reply With Quote Quick reply to this message
  #2  
Old February 7th, 2018, 09:43 AM
Unregistered
Guest
 
Default Re: grsecurity

Hello sir, will you please tell me what Grsecurity is? How to developer of Grsecurity? Provides basic features of grsecurity?
Reply With Quote Quick reply to this message
  #3  
Old February 7th, 2018, 09:44 AM
Super Moderator
 
Join Date: Aug 2012
Default Re: grsecurity

Brad Spengler (Spender) is devolved the Grsecurity. This is a computer system. The Grsecurity is a set of patches for the Linux kernel which emphasize security enhancements.

The patches are typically used by computer systems which accept remote connections from untrusted locations, such as web servers and systems offering shell access to its users.

Basic features of grsecurity:



The Grsecurity is provided details these are:

Chromium is a registered trademark of Google Inc.
Xen Project is a registered trademark of The Linux Foundation.
Linux is the registered trademark of Linus Torvalds in the U.S and other countries.

List of RBAC features:

Domain support for users and groups
Role transition tables
IP-based roles
Non-root access to special roles
Special roles that require no authentication
Nested subjects
Support for variables in the configuration
Create and delete object modes
Kernel interpretation of inheritance
Real-time regular expression resolution
Ability to deny ptraces to specific processes
Policy statistics for gradm
Inheritance-based learning
Secure policy enforcement
Supports the PaX flags
Shared memory protection feature
Full-featured, fine-grained auditing
Resource, socket, and capability support
Protection against exploit
Rules can be placed on non-existent files/processes
Policy regeneration on subjects and objects
Configurable log suppression
Configurable process accounting
Human-readable configuration
Not filesystem or architecture dependent
No run-time memory allocation
SMP safe
O(1) time efficiency for most operations
Include directive for specifying additional policies
Enable, disable, reload capabilities
Option to hide kernel processes
Reply With Quote Quick reply to this message
Reply

Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5.5. The time now is 01:53 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.1
vBulletin Optimisation provided by vB Optimise (Lite) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.