This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that cannot be found in any book at the time of this writing. If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on. http://www.puschitz.com/SecuringLinux.shtml -- Regards, Graham Smith ---------------------------------------------------------
Am Donnerstag 13 Januar 2005 15:23 schrieb Graham Smith:
If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on. http://www.puschitz.com/SecuringLinux.shtml Nice one ...:-)
Thanks Dan
Dan Am wrote:
Am Donnerstag 13 Januar 2005 15:23 schrieb Graham Smith:
If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on. http://www.puschitz.com/SecuringLinux.shtml
Nice one ...:-)
Thanks Dan
Indeed, yes! Thanks Martin
Graham Smith wrote:
This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that cannot be found in any book at the time of this writing. If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on. http://www.puschitz.com/SecuringLinux.shtml
Very nice and most of all an understandable guide. You could almost hand this to a newbie and he might be able to do the trick using this article. I would like to add one little comment though. If the password encryption method is not DES but MD5 the encrypted password begins with a '$'. Just for fun I entered the command and nearly got a heart-attack when the result claimed, aside of other users, user 'root' to have an unencrypted password. The option is at least available for Red Hat systems as well. I haven't installed any Red Hat distribution after 9.0, so I can't tell what the default encryption method is for recent Red Hat distributions. # egrep -v ':\*|:!|\$' /etc/shadow | awk -F: '{print $1}' Phew! MUCH better result!! Sandy
participants (4)
-
Dan Am
-
Graham Smith
-
Martin Deppe
-
Sandy Drobic