Fedora 12 Security Guide
The official "Fedora 12 Security Guide" is designed to assist users of Fedora, a Linux distribution built on free and open source software, in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity.
What people are saying - Write a review
We haven't found any reviews in the usual places.
List of Figures
Securing Your Network
General Principles of Information Security
Other editions - View all
access control allow Apache HTTP Server applications attacker auth authentication chain Click client configuration file cracker create credentials daemon database default devices Disabling Documentation dport encryption etc/sysconfig/iptables eth0 example.com Fedora firewall firewall rules following command GPG key hacker hostname hosts access implementation installed interface Internet IP address ipchains IPsec connection IPsec router iptables iptables command iptables rules IPv6 kadmin Kerberos kernel kinit Linux login machine match option Netfilter network packets network services network-to-network Nmap node package PAM configuration file pam_unix.so partition passphrase password cracking port numbers portmap prevent programs protect protocol realm Refer to Section remote requests restart root user root@myServer running SELinux server shell smart card specified sshd sudo system administrators target TCP Wrappers Telnet unencrypted updated user's username verify vsftpd vulnerability assessment workstation xinetd