---

Armoring Linux

Thanks to Julian
Coombes
for this link.

“Organizations throughout the world are adopting Linux as their
production platform. By connecting to the Internet to provide
critical services, they also become targets of opportunity. To help
protect these Linux systems, this article covers the basics of
securing a Linux box. The examples provided here are based on Red
Hat 5.x, but should apply to most Linux distributions.”

Read Armoring
Linux
.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis