FreeOS.com: Securing Linux: Part 2Dec 16, 2000, 14:33 (2 Talkback[s])
(Other stories by Trevor Warren)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
[ Thanks to Mayank for this link. ]
"This second article in the series takes you through TCP wrappers, OpenSSH, disabling unnecessary services and better monitoring of system activity by using unique log files to monitor specific information."
"Welcome back to an exciting odyssey in making your Linux box more secure. In the previous article we dealt with various issues like BIOS security passwords, securing your LILO prompt with a password, restricting the use of "setuid" and "setgid" programs etc. We also dealt with common user habits that compromise security on networks as well as some other aspects of securing your Linux installation."
"As we have mentioned earlier and repeat again, "The only secure machine is one unplugged from the electrical point." Another point we would like to stress upon is "Security is not a solution but a way of life."
0 Talkback[s] (click to add your comment)