Thursday, November 24, 2011

Hacking Red Hat Enteprise Linux

Hacking Red Hat Enteprise Linux Review



This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.

  • Covers Red Hat Enterprise Linux 5 and 6
  • Install, maintain, and update software
  • Learn how to modify file and directory permissions to prevent unauthorized users
  • Prevent unauthorized people from gaining shell access to accounts, particularly to privileged accounts
  • Master SELinux configuration
  • Configure logging, log monitoring, and auditing, using tools included with RHEL5
  • In-depth coverage of base services that are configured to start up on boot in a RHEL5 default installation

  • No comments:

    Post a Comment