A secure and open source operating system. All communications that reasonably can be will be encrypted. It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base

Features

  • firewall
  • access control
  • encryption
  • multi-user
  • secure

Project Activity

See All Activity >

License

Other License, Creative Commons Attribution ShareAlike License V3.0

Follow USE secure operating system

USE secure operating system Web Site

Other Useful Business Software
Need To Secure Your Public Cloud? Icon
Need To Secure Your Public Cloud?

Built for Developers, DevOps and Engineering Teams

View all cloud assets of AWS, Google Cloud, Azure, Kubernetes, Digital Ocean in one place. Automates security misconfigurations of assets with guidance to resolve them. Covers far beyond basic checklists. It automatically evaluates the security misconfigs of the assets & provides step-by-step guidance to resolve them
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of USE secure operating system!