Sams Teach Yourself Linux Security Basics in 24 Hours by Aron Hsiao

By Aron Hsiao

This booklet is an introductory, tutorial-style textual content designed to offer the reader a robust foundational wisdom of securing a Linux procedure. This booklet teaches the reader the best way to securely set up and run Linux because it comes shipped from so much Linux vendors. such a lot different titles during this industry specialize in using instruments and software program now not often integrated with Linux. Our technique teaches basics the reader can take to different working platforms. this article is designed to supply a simple advisor to resolving safety focused on using Linux in pc, small server, or small community environments.

  • Covered issues contain the following:
  • Securing community prone similar to Samba and NFS
  • Installation safety details
  • Firewalling with ipchains and iptables
  • Intrusion detection, auditing, and monitoring
  • BIOS and motherboard protection issues
  • Kerberos authentication
  • Data encryption
  • Eliminating identity and gadget risks
  • Preserving data
  • Steps to take if hacked

Show description

Read or Download Sams Teach Yourself Linux Security Basics in 24 Hours PDF

Best unix books

Building a Virtual Private Network

Your enterprise needs to be hooked up so one can compete within the international industry. staff want to know that their company's community is available at any time, from anywhere. A digital deepest community (VPN) accomplishes this by using distant connectivity applied sciences that mix current inner networks with the net to soundly converse info.

Mac OS X Leopard Phrasebook

Mac OS® X Leopard Phrasebook   Brian Tiemann   crucial Code and instructions   Mac OS X Leopard Phrasebook grants the full command words you want to take complete good thing about the Leopard’s hidden and undocumented strength beneath the graphical person interface: time-saving ideas for successfully operating with records, folders, the Finder, highlight, textual content records, servers, disks, CDs/DVDs, permissions, printing, purposes, Expos?

DNS & BIND Cookbook

The DNS & BIND Cookbook offers options to the various difficulties confronted via community directors answerable for a reputation server. Following O'Reilly's well known problem-and-solution cookbook structure, this identify is an quintessential spouse to DNS & BIND, 4th variation, the definitive consultant to the severe activity of brand server management.

Extra info for Sams Teach Yourself Linux Security Basics in 24 Hours

Example text

Org/security/. Debian is distinctive in that it is currently the only Linux operating system to offer an automatic upgrade path that can preserve for the most part the security status of the system being upgraded, avoiding the need for a complete re-install and re-editing of the myriad text files involved. Debian is also the only current distribution to fully support the Apple Macintosh in an official release. Both 68K Macintosh machines and PowerPC Macintosh machines are supported. Corel Linux is based on Debian GNU/Linux, but uses a different installer developed by Corel for ease-of-use and presents a different desktop system to the user.

Of course, if a cracker is somehow able to obtain root-level access to your system, each of these measures can be defeated, one by one. However, they do help to prevent an intruder from gaining root-level access in the first place, and they will stop many of the more clueless script kiddies dead in their tracks. 2 is one possible example, and we’ll work with it a little later, once the install is more or less complete. Note that using this many partitions will require that you create an extended partition.

The boot order setting you’re looking for will look more like this when you’re done: Boot order: C Only Or, if your system separates the options, they might look more like this once you’ve secured the boot order: • First boot device: Hard Drive C • Second boot device: Disabled • Third boot device: Disabled • Fourth boot device: Disabled Under the settings above, only the hard drive will ever be used to boot the system. A malicious user can insert a floppy disk in hopes of bypassing your Linux passwords and getting at your data, but your system will ignore the floppy disk altogether.

Download PDF sample

Rated 4.27 of 5 – based on 17 votes