First page Back Continue Last page Summary Graphic
Armoring the System
At this point, we can continue putting the defenses in place. We should have already got ssh up and running and keys generated, inetd tightened. We should proceed to set up internal defenses, perimeter defenses and logging helps. There are a growing number of security-related applications for Linux. In the next few slides, I will give a number of apps which I use or have used in the past.