Solved

Linux Security

Posted on 2000-02-14
4
269 Views
Last Modified: 2010-04-20
Hello,

I just setup Redhat linux 6.1 as a proxy server using squid.  I seriuosly doubt that linux is a secure nos out of the box so my question is what steps do I need to take in order to make linux secure from outside (or inside) attacks.  Not just as a proxy server but as a web/db/file server.  I haven't seen any real step by step procedure for securing linux with respect to it's role.  I'm not looking for a bunch of links or documents that discuss linux security but offer no real information.

Thanks,

Joe
0
Comment
Question by:jvieira
  • 2
4 Comments
 

Expert Comment

by:kufel
ID: 2520127
0
 

Author Comment

by:jvieira
ID: 2520270
I don't want to use linux for a firewall.  In fact I already have a firewall.  What I need is information on securing the Linux OS.  If I use my linux box as a web server without changing the default settings I'm sure I would be open to numerous types of attacks (ie DoS).  The same would go if I used it as a DB server and so on.  I was looking for information on how to secure linux depending on it's role.  The steps to secure a web server would not neccesarily be the same steps to secure a DB server.

Thanks,

Joe
0
 

Accepted Solution

by:
ohad23 earned 50 total points
ID: 2521690
Hi,
you can read all about it in: http://freshmeat.net/news/2000/02/09/950085316.html
0
 

Author Comment

by:jvieira
ID: 2532415
Thanks
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux/Apache File Ownership/Permissions 1 64
Linux Copy Command - All Files inc Directory 1 43
Setting up static IP - Ubuntu server 16.04 12 65
installing docker on ubuntu 6 29
The purpose of this article is to demonstrate how we can use conditional statements using Python.
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question