Linux Security
A. Justin Wilder, Telos Corporation
Network Interface Configuration
Applications and Service Daemons
Restricting Applications and Services
Application and Services References
Root, User, and Group Accounts
INTRODUCTION
This chapter was written based on version 9 of the Red Hat Linux and the Red Hat Fedora Core 1 and 2 distributions. Although the examples used in this chapter may focus on a limited set of Linux distributions, the fundamental concepts can be used with nearly every Linux distribution. Each section remains focused on hardening the core operating system using the tools and capabilities of the base installation. The sections do not go into detail on other additive security controls as there are far too many variations to adequately address within the scope of this chapter.
The reader ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.