Solved

Linux Security

Posted on 2000-02-14
4
268 Views
Last Modified: 2010-04-20
Hello,

I just setup Redhat linux 6.1 as a proxy server using squid.  I seriuosly doubt that linux is a secure nos out of the box so my question is what steps do I need to take in order to make linux secure from outside (or inside) attacks.  Not just as a proxy server but as a web/db/file server.  I haven't seen any real step by step procedure for securing linux with respect to it's role.  I'm not looking for a bunch of links or documents that discuss linux security but offer no real information.

Thanks,

Joe
0
Comment
Question by:jvieira
  • 2
4 Comments
 

Expert Comment

by:kufel
ID: 2520127
0
 

Author Comment

by:jvieira
ID: 2520270
I don't want to use linux for a firewall.  In fact I already have a firewall.  What I need is information on securing the Linux OS.  If I use my linux box as a web server without changing the default settings I'm sure I would be open to numerous types of attacks (ie DoS).  The same would go if I used it as a DB server and so on.  I was looking for information on how to secure linux depending on it's role.  The steps to secure a web server would not neccesarily be the same steps to secure a DB server.

Thanks,

Joe
0
 

Accepted Solution

by:
ohad23 earned 50 total points
ID: 2521690
Hi,
you can read all about it in: http://freshmeat.net/news/2000/02/09/950085316.html
0
 

Author Comment

by:jvieira
ID: 2532415
Thanks
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now