Librenix  
(Show all Security articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Linux Configuration for Security

Up
vote
Down

System and server application may be the biggest part of Linux security...
Configuration-centered security is sometimes called security architecture or proactive security. Under any name, the approach means making the design and installation of a computer system part of your security. Dan Razzell, president of Starfish Systems, a Canadian consulting firm, explains, "When you build a system, you build it for a purpose. If you can accurately articulate the purpose of the system, then the system displays all the functions you want and none of the functions you don't want -- because it's the functions you don't want that are an egregious source of security exposure. Basically, if you don't carry any baggage that you don't need, you can solve a lot of your security issues right there. So, really, configuration really drives security."
 read more | mail this link | score:6535 | -Ray, December 13, 2006
More Sysadmin articles...

Abstract Art in Tallahassee

admin headlines

Testing the Digital Ocean $5 Cloud Servers with an MMORPG

USB Redirection hack on Two Node Controller+Compute Neutron GRE+OVS Fedora 20 Cluster

Setup Dashboard and VNC console on Two Node Controller+Compute Neutron GRE+OVS+Gluster Fedora 20 Cluster

Using ngx_pagespeed With nginx On Debian Jessie/testing

Step By Step Ubuntu 13.04 (Raring Ringtail) LAMP Server Setup

How to install S3QL from source on Fedora 19

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin