O'Reilly logo

Red Hat Linux System Administration Handbook by Mark F. Komarinski, Cary Collett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Securing Linux

It may not seem easy, but it has to be done

With most of the machines in the world connected via the Internet, security is a big concern, whether you have hundreds of machines or one dial-up machine.

No system can be completely secure from outside attacks. Anyone determined enough has a good chance of cracking[1] into your system. The best thing you can do is to prepare yourself and your machine, make it as hard as possible, and be able to detect when you're being cracked.

Physical Security

The first part of keeping a system secure is making sure the hardware cannot be tampered with. Part of the C2 security specification for computer systems says that the computer must not be physically accessible to anyone without access. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required