LinuxWorld: Securing Linux, Part 2Jul 07, 1999, 08:09 (0 Talkback[s])
(Other stories by Michael H. Warfield)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"Michael H. Warfield instills in his readers that healthy sense of paranoia which is so necessary for anyone involved in advanced systems security. In "Securing Linux, Part 2," Warfield will have you checking system integrity against CD-ROM snapshots, nervously checking stacks for buffer overflows, and systematically checking the secure-distros mailing list (and other information sources) during all of your waking hours."
"These advanced tips are mostly for larger systems or networks which have more resources, or which are a more valuable target, or which are run by more experienced system administrators who are available to implement and maintain the installation. They should be implemented in conjunction with the security precautions discussed in Part 1 of this series..."
0 Talkback[s] (click to add your comment)