Security guide fedora security-guide A Guide to Securing Fedora Linux Johnray Fuller John Ha David O'Brien Scott Radvan Eric Christensen Csecurity-guide fedora security-guide A Guide to Securing Fedora Linux Edition Author Author Author Author Author John

fedora security-guide A Guide to Securing Fedora Linux Johnray Fuller John Ha David O'Brien Scott Radvan Eric Christensen Csecurity-guide fedora security-guide A Guide to Securing Fedora Linux Edition Author Author Author Author Author Johnray Fuller John Ha David O'Brien Scott Radvan Eric Christensen jrfuller redhat com jha redhat com daobrien redhat com sradvan redhat com sparks fedoraproject org Copyright ? Red Hat Inc The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution ??Share Alike Unported license CC-BY-SA An explanation of CC-BY-SA is available at http creativecommons org licenses by-sa The original authors of this document and Red Hat designate the Fedora Project as the Attribution Party for purposes of CC-BY-SA In accordance with CC-BY-SA if you distribute this document or an adaptation of it you must provide the URL for the original version Red Hat as the licensor of this document waives the right to enforce and agrees not to assert Section d of CC-BY-SA to the fullest extent permitted by applicable law Red Hat Red Hat Enterprise Linux the Shadowman logo JBoss MetaMatrix Fedora the In ?nity Logo and RHCE are trademarks of Red Hat Inc registered in the United States and other countries For guidelines on the permitted uses of the Fedora trademarks refer to https fedoraproject org wiki Legal Trademark guidelines Linux is the registered trademark of Linus Torvalds in the United States and other countries All other trademarks are the property of their respective owners The Linux Security Guide is designed to assist users of Linux in learning the processes and practices of securing workstations and servers against local and remote intrusion exploitation and malicious activity The Linux Security Guide details the planning and the tools involved in creating a secured computing environment for the data center workplace and home With proper administrative knowledge vigilance and tools systems running Linux can be both fully functional and secured from most common intrusion and exploit methods CPreface vii Document Conventions vii Typographic Conventions vii Pull-quote Conventions viii Notes and Warnings ix We Need Feedback x Security Overview Introduction to Security What is Computer Security SELinux Security Controls Conclusion Vulnerability Assessment Thinking Like the Enemy De ?ning Assessment and Testing Evaluating the Tools Attackers and Vulnerabilities A Quick History of Hackers Threats to Network Security Threats to Server Security Threats to Workstation and Home PC Security Common Exploits and Attacks Security Updates Updating Packages Verifying Signed Packages Installing Signed Packages Applying the Changes Securing Your Network Workstation Security Evaluating Workstation Security BIOS and Boot Loader Security Password Security Administrative Controls Available Network Services Personal Firewalls Security Enhanced Communication Tools Server Security Securing Services With TCP Wrappers and xinetd Securing Portmap Securing NIS Securing NFS Securing the Apache HTTP Server Securing FTP Securing Sendmail Verifying Which Ports Are Listening Single Sign-on SSO Introduction Getting Started with your new Smart Card How Smart Card Enrollment Works How Smart Card Login Works iii Csecurity-guide Con ?guring Firefox to use Kerberos for SSO Pluggable

  • 42
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Attribution requise
Partager
  • Détails
  • Publié le Sep 22, 2021
  • Catégorie Administration
  • Langue French
  • Taille du fichier 563.6kB