Security

Generally, it is a truism that Unix—and Linux—systems were not designed with security in mind. In fact, Linux is intended to facilitate easy manipulation of data and files in a networked, multiuser environment. By definition, such a system is vulnerable, particularly with an external Internet connection.

Furthermore:

  • Linux security is on or off. Either you are the all-powerful superuser, root, or you are not.

  • Many important administrative functions are performed outside the kernel—for example, by editing configuration files—where they can easily be tampered with.

So, bear in mind that a Linux server is inherently insecure. In addition, the more secure it is made, the less pleasant and convenient it will be to use.

Given these constraints ...

Get Red Hat Linux 6: Visual QuickPro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.