12.1. Linux Security Checklist12.1.1. Finding Distribution-Specific Security Resources12.1.2. Finding General Security Resources12.2. Using Linux Securely12.2.1. Using Password Protection12.2.2. Choosing Good Passwords12.2.3. Using a Shadow Password File12.2.3.1. Breaking Encrypted Passwords12.2.3.2. Checking for the Shadow Password File12.3. Using Log Files12.3.1. The Role of syslogd12.3.2. Redirecting Logs to a Loghost with syslogd12.3.3. Understanding the messages Log File12.4. Using Secure Shell Tools12.4.1. Starting the SSH Service12.4.2. Using the ssh, sftp, and scp Commands12.4.3. Using ssh, scp, and sftp without Passwords12.5. Securing Linux Servers12.5.1. Controlling Access to Services with TCP Wrappers12.5.2. Understanding Attack Techniques12.5.3. Protecting Against Denial-of-Service Attacks12.5.3.1. Mailbombing12.5.3.1.1. Blocking Mail with Procmail12.5.3.1.2. Blocking Mail with sendmail12.5.3.2. Spam Relaying12.5.3.3. Smurf Amplification Attack12.5.4. Protecting Against Distributed DoS Attacks12.5.5. Protecting Against Intrusion Attacks12.5.5.1. Evaluating Access to Network Services12.5.5.2. Disabling Network Services12.5.6. Securing Servers with SELinux12.5.7. Protecting Web Servers with Certificates and Encryption12.5.7.1. Symmetric Cryptography12.5.7.2. Asymmetric Cryptography12.5.7.3. Secure Sockets Layer12.5.7.3.1. Creating SSL Certificates12.5.7.3.2. Using Third-Party Certificate Signers12.5.7.3.3. Creating a Certificate Service Request12.5.7.3.4. Getting Your CSR Signed12.5.7.3.5. Creating Self-Signed Certificates12.5.7.3.6. Restarting Your Web Server12.5.7.3.7. Troubleshooting Your Certificates12.6. Using Linux Live CD Security Tools12.6.1. Advantages of Security Live CDs12.6.2. Using INSERT to Check for Rootkits12.7. Summary