“Michael H. Warfield instills in his readers that healthy sense
of paranoia which is so necessary for anyone involved in advanced
systems security. In “Securing Linux, Part 2,” Warfield will have
you checking system integrity against CD-ROM snapshots, nervously
checking stacks for buffer overflows, and systematically checking
the secure-distros mailing list (and other information sources)
during all of your waking hours.”
“These advanced tips are mostly for larger systems or networks
which have more resources, or which are a more valuable target, or
which are run by more experienced system administrators who are
available to implement and maintain the installation. They should
be implemented in conjunction with the security precautions
discussed in Part 1 of this series…”
Related: