Librenix  
(Show all Security articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Linux Configuration for Security

Up
vote
Down

System and server application may be the biggest part of Linux security...
Configuration-centered security is sometimes called security architecture or proactive security. Under any name, the approach means making the design and installation of a computer system part of your security. Dan Razzell, president of Starfish Systems, a Canadian consulting firm, explains, "When you build a system, you build it for a purpose. If you can accurately articulate the purpose of the system, then the system displays all the functions you want and none of the functions you don't want -- because it's the functions you don't want that are an egregious source of security exposure. Basically, if you don't carry any baggage that you don't need, you can solve a lot of your security issues right there. So, really, configuration really drives security."
 read more | mail this link | score:7120 | -Ray, December 13, 2006
More Sysadmin articles...

Buy Art Online with a Free Return Policy

admin headlines

Using ngx_pagespeed With nginx On Debian Jessie/testing

Step By Step Ubuntu 13.04 (Raring Ringtail) LAMP Server Setup

Tutorial: Linux Show Statistics For Individual Tasks and Process

GlusterFS 3.2 Tutorial: Distributed Storage on 4 Nodes (Ubuntu 12.04)

Tutorial: Ubuntu 12.04 Samba, tdbsam Server

Distributed replicated storage on 4 nodes with GlusterFS 3.2.x on Ubuntu 12.04

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin