Provides advice on ways to ensure network security, covering such topics as DNS, Apache web server, OpenLDAP, email encryption, Cyrus IMAP service, and FTP server.
In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.
Details all the Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon, helping Linux administrators identify and plug security holes on their systems.
Although 384-bit EC keys are better, this is good enough for most use cases on an internal LAN. Next, enable the dirsrv.target and the pki-tomcatd.target so that they'll automatically start when you reboot the server: sudo systemctl ...
As it happens , SuSE's log - rotation scheme is less powerful but also much simpler than Red Hat's and Debian's ... its behavior is controlled by the file / etc / logfiles , which is simply a list of the files you wish to rotate along ...
b Number of blocks allocated a Access timestamp m Modification timestamp c Inode creation/modification timestamp c Cyclic redundancy check Table 3.4 tripwire Policy File Property Mask Characters (continued) Property Description The ...
Secure your Linux server and protect it from intruders, malware attacks, and other external threats Donald A. Tevault ... I'll then show you a way to cheat so that you can have a Snort system up and running in no time at all.
In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, ...
In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security.
This book is a system saver.