June 2003
Intermediate to advanced
464 pages
10h 33m
English
This section discusses what to consider before applying patches and other security considerations. For more information on patches and hardening than we can provide here, see http://www.ibm.com/servers/security/planner.
A typical Linux security attack is based on vulnerabilities in commonly used Open Source software, such as BIND, Sendmail, NFS, and “r”-programs such as rexec, rsh, and rcp. One of the main advantages of Open Source software is the speed at which security vulnerabilities are identified and patched. Because of this, it is important to develop a strategy for upgrading critical server software components. This strategy should include the following processes: ...