Table of Contents
/etc/exports
file/etc/inetd.conf
file/etc/host.conf
file/etc/securetty
filelilo.conf
file/etc/rc.d/
A secure Linux server depends on how the administrator configures it to be. Once we have eliminated the potential securities risk by removing RPM services not needed, we can start to secure our existing services and software on our server. In this chapter we will discuss some of the more general, basic techniques used to secure your system. The following is a list of features that can be used to help prevent attacks from external and internal sources.