How To Harden My Filesystem - Page 7
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
This book is intended as a 'self help' guide to computer & network security, primarily for security managers, programmers and system administrators.
This is reportedly the document that started computer security. It discusses intrusions, physical security, threats, policy considerations, and recommendations. Quite good.
This is a great document that answers such questions as What is intrusion detection? and How do I know if I've been attacked?
SSLeay is a free implementation of Netscape's Secure Socket Layer - the software encryption protocol behind the Netscape Secure Server and the Netscape Navigator Browser.
This document describes how to configure Linux as NIS(YP) or NIS+ client and how to install as NIS server.
RFC2196 is a guide to developing computer security policies and procedures for sites that have systems on the Intenet. The purpose of this handbook is to provide practical guidance to administrators trying to secure their information and services. Th
This document will (eventually, more or less extensively) describe all major development activities around the Linux operating system that provide encryption features to the kernel.
Describes installing the BIND 9 nameserver to run in a chroot jail and as a non-root user, to provide added security and minimise the potential effects of a security compromise.
This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are p
This document, written by Hal Burgiss, is an introductory level document that provides the information necessary for inexperienced Linux users to secure their machine. Well-written and thorough.
This is a document that I last made modifications to in 1998, but is still pretty relevant. Topics covered include developing a security policy, network and host security tips, process accounting, physical security, intrusion detection, files and fil
This Quick Reference Guide is intended to provide a starting point for improving the security of your system. Contained within include references to security resources around the net, tips on securing your Linux box, and general security information.
This FAQ is intended to serve as a starting point for those new to the newsgroup, but is also intended to be a survey of Linux security issues and tools. This FAQ is aimed at intermediate to experienced Linux users and is intended to not only ans