This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Android-based

Arch-based

Debian-based

Gentoo-based

Other Linux distributions

BSD

Xen

See also

References

  1. "About The Calyx Institute - Calyx Institute". calyxinstitute.org. Retrieved 2 November 2021.
  2. "Kali NetHunter Documentation". Kali Linux Documentation. Retrieved 5 April 2020.
  3. "Parrot Security Could Be Your Next Security Tool". Linux.com | The source for Linux information. 2 December 2016. Retrieved 9 March 2018.
  4. Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017.
  5. "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 November 2012. Retrieved 10 July 2014.
  6. Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. Retrieved 10 July 2014.
  7. "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. Retrieved 10 July 2014.
  8. Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint.
  9. KITE Introduces a New Secured FOSS Based Operating System
  10. A Look at Pentoo Linux and Its Security Analysis Tools, eWeek
  11. 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
  12. "about | Alpine Linux". alpinelinux.org.
  13. says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com".
  14. "Fedora Silverblue User Guide :: Fedora Docs". docs.fedoraproject.org. Archived from the original on 11 October 2021. Retrieved 11 October 2021.
  15. OpenBSD Project (19 May 2020). "OpenBSD". OpenBSD.org. Retrieved 12 October 2020.
  16. "Qubes OS bakes in virty system-level security". The Register. 5 September 2012.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.