First page Back Continue Last page Summary Graphics

Armoring the System

  • At this point, we can continue putting the defenses in place. We should already have ssh up and running and keys generated, inetd tightened. We should proceed to set up internal defenses, perimeter defenses and logging helps. There are a growing number of security-related applications for Linux. In the next few slides, I will give a number of apps which I use or have used in the past.

    Notes: