Librenix  
(Show all Security articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Linux Configuration for Security

Up
vote
Down

System and server application may be the biggest part of Linux security...
Configuration-centered security is sometimes called security architecture or proactive security. Under any name, the approach means making the design and installation of a computer system part of your security. Dan Razzell, president of Starfish Systems, a Canadian consulting firm, explains, "When you build a system, you build it for a purpose. If you can accurately articulate the purpose of the system, then the system displays all the functions you want and none of the functions you don't want -- because it's the functions you don't want that are an egregious source of security exposure. Basically, if you don't carry any baggage that you don't need, you can solve a lot of your security issues right there. So, really, configuration really drives security."
 read more | mail this link | score:7647 | -Ray, December 13, 2006
More Sysadmin articles...

Buy Art Online with a Free Return Policy

admin headlines

USB Redirection hack on Two Node Controller+Compute Neutron GRE+OVS Fedora 20 Cluster

Setup Dashboard and VNC console on Two Node Controller+Compute Neutron GRE+OVS+Gluster Fedora 20 Cluster

Gluster 3.4.2 on Two Node Controller+Compute Neutron GRE+OVS Fedora 20 Cluster

Running SilverStripe On Nginx (LEMP) On Debian Wheezy/Ubuntu 13.04

Quantum basic RDO setup (grizzly) to have original LAN as external on CentOS 6.4

Step By Step Ubuntu 13.04 (Raring Ringtail) LAMP Server Setup

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin