Mailing the story:

Securing Linux, Part 2: Planning the installation

Only the paranoid survive, and that is no less true when securing Linux systems as any other. Fortunately, a host of security features are built into the kernel, are packaged with one of the many Linux distributions, or are available separately as open source applications. This second installment covers inventory assessment, risk analysis, identifying user categories and access privileges, and then moves on to a more detailed action plan and steps for safely acquiring a Linux distribution.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?