A. Justin Wilder, Telos Corporation
This chapter was written based on version 9 of the Red Hat Linux and the Red Hat Fedora Core 1 and 2 distributions. Although the examples used in this chapter may focus on a limited set of Linux distributions, the fundamental concepts can be used with nearly every Linux distribution. Each section remains focused on hardening the core operating system using the tools and capabilities of the base installation. The sections do not go into detail on other additive security controls as there are far too many variations to adequately address within the scope of this chapter.
The reader ...