Part IV. Administration
33.9. For More Information
Chapter 34. Security in Linux
Administration
Table of Contents
34. Security in Linux
34.1. Masquerading and Firewalls
34.2. SSH: Secure Network Operations
34.3. Encrypting Partitions and Files
34.4. Security and Confidentiality
35. Access Control Lists in Linux
35.1. Advantages of ACLs
35.2. Definitions
35.3. Handling ACLs
35.4. ACL Support in Applications
35.5. For More Information
36. System Monitoring Utilities
36.1. List of Open Files:
lsof
36.2. User Accessing Files:
fuser
36.3. File Properties:
stat
36.4. USB Devices:
lsusb
36.5. Information about a SCSI Device:
scsiinfo
36.6. Processes:
top
36.7. Process List:
ps
36.8. Process Tree:
pstree
36.9. Who Is Doing What:
w
36.10. Memory Usage:
free
36.11. Kernel Ring Buffer:
dmesg
36.12. File Systems and Their Usage:
mount
,
df
, and
du
36.13. The
/proc
File System
36.14.
vmstat
,
iostat
, and
mpstat
36.15.
procinfo
36.16. PCI Resources:
lspci
36.17. System Calls of a Program Run:
strace
36.18. Library Calls of a Program Run:
ltrace
36.19. Specifying the Required Library:
ldd
36.20. Additional Information about ELF Binaries
36.21. Interprocess Communication:
ipcs
36.22. Time Measurement with
time