Red Hat Linux security and optimization by Mohammed J. Kabir

By Mohammed J. Kabir

Pink Hat Linux defense and Optimization is a reference for power-users and directors overlaying all protection matters, together with Filesystems safety, Securing root debts and Firewalls. different defense books discuss how you can follow convinced patches to mend a safety challenge -- yet this e-book exhibits you the way to safe all purposes in order that the probabilities for a safety breach are immediately minimized. software functionality benchmarking can be coated. This publication introduces you to many application-specific functionality and benchmarking concepts and indicates you the way to music your desktop in addition to your networks. This e-book covers the entire fundamental purple Hat Linux purposes comparable to Apache internet Server, WuFTP, FTP server, BIND DNS server, Sendmail SMTP server and specializes in the way to increase safeguard for every of them. It additionally exhibits you the way to safe NFS and Samba Server, in addition to the Apache internet Server.

Show description

Read Online or Download Red Hat Linux security and optimization PDF

Best unix books

Building a Virtual Private Network

Your small business has to be attached which will compete within the international industry. staff want to know that their company's community is on the market at any time, from anywhere. A digital inner most community (VPN) accomplishes this by using distant connectivity applied sciences that mix latest inner networks with the net to safely converse details.

Mac OS X Leopard Phrasebook

Mac OS® X Leopard Phrasebook   Brian Tiemann   crucial Code and instructions   Mac OS X Leopard Phrasebook promises the total command words you want to take complete benefit of the Leopard’s hidden and undocumented strength beneath the graphical consumer interface: time-saving recommendations for successfully operating with records, folders, the Finder, highlight, textual content documents, servers, disks, CDs/DVDs, permissions, printing, purposes, Expos?

DNS & BIND Cookbook

The DNS & BIND Cookbook provides strategies to the numerous difficulties confronted through community directors accountable for a reputation server. Following O'Reilly's renowned problem-and-solution cookbook structure, this name is an necessary better half to DNS & BIND, 4th variation, the definitive advisor to the severe job of brand name server management.

Extra info for Red Hat Linux security and optimization

Sample text

40MB per second for 16-bit (wide) bus (Ultra Wide SCSI). SCSI-3 Ultra 2 or Fast-40 SCSI Synchronous data transfer option, which enables up to 40 MHz data clocking on the bus. 80MB per second for 16-bit (wide) bus (Ultra2 Wide SCSI) SCSI-3 Ultra 3 or Ultra160 or Fast-80 160MB per second for wide bus. SCSI-3 SCSI-1 Most people either use IDE/EIDE hard disks or SCSI disks. Only a few keep both types in the same machine, which isn’t a problem. F 11/5/01 9:03 AM Page 23 Chapter 2: Kernel Tuning two in your system, enable support for only the type you need unless you plan on adding the other type in the future.

If you have a Pentium Pro; Pentium II or later model Intel CPU; or an Intel clone such as Cyrix 6x86, 6x86MX AMD K6-2 (stepping 8 and above), and K6-3, enable the Memory Type Range Register (MTRR) support by choosing the Enable MTRR for PentiumPro/II/III and newer AMD K6-2/3 systems option. MTRR support can enhance your video performance. 3. If you have a system with multiple CPUs and want to use multiple CPUs using the symmetric multiprocessing support in the kernel, enable the Symmetric multi-processing (SMP) support option.

If you have the hardware to create a wireless LAN, select the Wireless LAN support and choose appropriate wireless hardware. USB SUPPORT If you have at least one USB device to connect to your Linux system, select the USB support and choose the appropriate options for such features as USB audio/multimedia, modem, and imaging devices. UNIVERSAL SYSTEM OPTIONS These configuration options apply for servers, desktops, and laptops. NETWORKING SUPPORT Even if you don’t want to network the system, you must configure the networking support from the General setup submenu using the Networking support option.

Download PDF sample

Rated 4.14 of 5 – based on 48 votes