Hacking Red Hat Enteprise Linux Review
This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.
Covers Red Hat Enterprise Linux 5 and 6Install, maintain, and update softwareLearn how to modify file and directory permissions to prevent unauthorized usersPrevent unauthorized people from gaining shell access to accounts, particularly to privileged accountsMaster SELinux configurationConfigure logging, log monitoring, and auditing, using tools included with RHEL5In-depth coverage of base services that are configured to start up on boot in a RHEL5 default installation
No comments:
Post a Comment