Chapter 2
Securing Linux
IN THIS CHAPTER
Securing passwords on Linux systems
Protecting the system’s files and directories
Using GnuPG to encrypt and sign files
Monitoring the security of your system
Hardening Internet services
Using Secure Shell for secure remote logins
Setting up simple firewalls and enabling packet filtering
To secure your Linux system, you have to pay attention to both host security and network security. The distinction between the two types of security is somewhat arbitrary, because securing the network involves securing the applications on the host that relate to which Internet services your system offers.
This chapter first examines host security and then explains how you can secure network services (mostly by not offering unnecessary services), how you can ...
Get Linux All-In-One For Dummies, 7th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.