Configurations that keep your Linux System safe from attack

Posted by VISITOR on Apr 19, 2005 6:58 PM
By IBM developerWorks
Mail this story
Web version

In this series of articles, learn how to plan, design, install, configure, and maintain systems running Linux in a secure way. In addition to a theoretical overview of security concepts, installation issues, and potential threats and their exploits, you'll also get practical advice on how to secure and harden a Linux-based system.

In this series of articles, learn how to plan, design, install, configure, and maintain systems running Linux in a secure way. In addition to a theoretical overview of security concepts, installation issues, and potential threats and their exploits, you'll also get practical advice on how to secure and harden a Linux-based system.

Full Story

Printed at http://lxer.com/module/newswire/view/34947/index.html