Librenix  
(Show all Security articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Linux Configuration for Security

Up
vote
Down

System and server application may be the biggest part of Linux security...
Configuration-centered security is sometimes called security architecture or proactive security. Under any name, the approach means making the design and installation of a computer system part of your security. Dan Razzell, president of Starfish Systems, a Canadian consulting firm, explains, "When you build a system, you build it for a purpose. If you can accurately articulate the purpose of the system, then the system displays all the functions you want and none of the functions you don't want -- because it's the functions you don't want that are an egregious source of security exposure. Basically, if you don't carry any baggage that you don't need, you can solve a lot of your security issues right there. So, really, configuration really drives security."
 read more | mail this link | score:6427 | -Ray, December 13, 2006
More Sysadmin articles...

Abstract Art Prints for Sale

admin headlines

Setting up NFS on Scientific Linux 6.3

Virtual Hosting with PureFTPd and MySQL on Ubuntu 12.10

Virtual users with Postfix/Courier/MySQL/SquirrelMail (Ubuntu 12.10)

pfSense - Squid + Squidguard / Traffic Shaping Tutorial

nginx: Block Visitors by Country with GeoIP Module (Debian/Ubuntu)

Set up Multi-Level / Master-Slave Umbrella Network Monitoring

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin