"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as hardening IP tables and remote access functionality.
After reading this book, I think it is going to be the mandatory companion I hand out to new Linux administrators, along with Essential System Administration. The first 6 chapters are exceptional. I can't say enough good things about them. The coverage of PAM is better than anything I have seen. The coverage of authentication, groups, users and best practices surrounding them was very good as well. The logging chapter...
0Report
I haven't run a Linux box since 2002. Some time ago, realizing that I'd soon have a chance to migrate to using Linux for everyday work, I decided I should start refreshing my *NIX commands and shell scripting. Then, I saw "Hardening Linux". Rather spontaneously, I decided to start with this security-focused title instead of the perhaps more intuitive path of installing the latest distro, setting up a bunch of daemons, installing...
0Report
I strongly recommend this book for systems administrators and those running personal Linux systems. This book covers all of the basics of locking down a Linux system, and presents it in a way that is easy to understand and follow. In particular I was pleased with the sections on securing connections to the machine and the file system.
0Report
The book starts with the basics of hardening a Linux system to prevent purposeful attack as well as the inadvertently harm some users may cause. This basic section includes booting securely, securing virtual consoles, passwords, groups, users, authentication modules, package management, hardening your kernel, and removing development tools that are not needed. Of course no book on hardening a system would be complete without...
0Report
I thought this might just be a book on iptables and other firewalls, but it's much more. In 400 pages, this covers everything from initial installation right through what to do if you did get breached. It covers email security, ftp, dns and bind, ssh, file systems, pam authentication, firewalls, penetration testing and more. The really impressive thing is that everything is covered well - obviously some of these subjects...
0Report