O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Host Security

Your host must be secure. Simple security steps include preventing remote logins and leaving the /etc/hosts.equiv and individual users' ~/.rhosts files empty (or not having them at all). Complex security steps include installing IPSec for VPNs between hosts. Many common security measures are between these two extremes. A few of these follow. See Table C-1 on page 1421 for URLs.

  • Although potentially tricky to implement and manage, Intrusion Detection Systems (IDSs) are an excellent way to keep an eye on the integrity of a device. An IDS can warn of possible attempts at subverting security on the host on which it runs. The great-granddaddy of intrusion detection systems is tripwire. This host-based system checks modification times ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required