Security configuration and set-up for Linux servers exposed to the internet: Any computer connected to the internet will require steps and precautions to be taken to reduce the exposure to hacker threats. Web, mail and DNS servers are especially vulnerable. Large operations will hide behind a CISCO firewall for most of their protection. The Linux server must be configured for network security and have its applications and services configured for security. This tutorial covers steps and tools which can be used to monitor and counteract hacker threats. Simply put, it is security risk management.
|This tutorial will cover basic installation and configuration for:
Performing A Security audit:
Also on this page:
Prerequisites: This tutorial assumes that a computer has Linux installed and running. See RedHat Installation for the basics. A connection to the internet is also assumed. The tasks must also be performed with the root user login and password.
The computer is most vulnerable to attack through network exploits. This tutorial covers detection and protection.