Librenix  
(Show all Security articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Linux Configuration for Security

Up
vote
Down

System and server application may be the biggest part of Linux security...
Configuration-centered security is sometimes called security architecture or proactive security. Under any name, the approach means making the design and installation of a computer system part of your security. Dan Razzell, president of Starfish Systems, a Canadian consulting firm, explains, "When you build a system, you build it for a purpose. If you can accurately articulate the purpose of the system, then the system displays all the functions you want and none of the functions you don't want -- because it's the functions you don't want that are an egregious source of security exposure. Basically, if you don't carry any baggage that you don't need, you can solve a lot of your security issues right there. So, really, configuration really drives security."
 read more | mail this link | score:7524 | -Ray, December 13, 2006
More Sysadmin articles...

Buy Art Online with Satisfaction Guaranteed

admin headlines

Unix: Show Network Interface Card Statistics

Tutorial: Install Nagios 3.4.4 on CentOS 6.3

Run VirtualBox 4.2 on Ubuntu 12.10 Headless Server

Installing SugarCRM Community Edition On Fedora 17

A Beginners Guide To btrfs

Simple Virtual Hosts with mod_mysql_vhost on Lighttpd (Debian 6)

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin