Hardening Linux: a 10 step approach
The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.
This list of steps is intended as a guideline with a practical approach. Weíll try to provide a complete picture without getting into unnecesary details. This list wonít replace a good book on secure systems administration, but it will be useful as a quick guide.
Before we get started itís worth to mention that security is not a status: itís just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.
(Submitted by Flavio Villanustre Fri Jun 17, 2005 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author