Skip to Content
Security Strategies in Linux Platforms and Applications, 2nd Edition
book

Security Strategies in Linux Platforms and Applications, 2nd Edition

by Michael Jang, Ric Messier
October 2015
Intermediate to advanced
514 pages
16h 19m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 2nd Edition

CHAPTER

7

Networks, Firewalls, and More

WHEN YOU HAVE A NETWORK SERVICE INSTALLED, you allow other systems to connect to you. If you use common services like Web servers, SSH servers, and file-sharing servers, you are guaranteed to have specific ports open. When you connect to a Web server, for example, there is an expectation that it will be listening on port 80. You can certainly have your Web server listening on a different port, but that makes it harder for users to connect to you. The obscurity you introduce by moving to a different port is likely to have a minimal impact on whether an attacker finds your service or not. Obscurity is the hiding of information. Sometimes this means placing it in nonstandard locations.

Some services ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Michael Jang

Publisher Resources

ISBN: 9781284090659