Objectives
Identify typical security issues
State the difference between “hacker” and “cracker”
List typical attack vectors against computers
Implement additional aspects of password security
Take some basic steps to improve security of any Linux host
Introduction
Linux is a very secure operating system. It provides a secure environment in which to work and store files. However, good security, by its very nature, can be a bit obtrusive. Security must not be an afterthought; it ...