Solved

Linux Security

Posted on 2000-02-14
4
271 Views
Last Modified: 2010-04-20
Hello,

I just setup Redhat linux 6.1 as a proxy server using squid.  I seriuosly doubt that linux is a secure nos out of the box so my question is what steps do I need to take in order to make linux secure from outside (or inside) attacks.  Not just as a proxy server but as a web/db/file server.  I haven't seen any real step by step procedure for securing linux with respect to it's role.  I'm not looking for a bunch of links or documents that discuss linux security but offer no real information.

Thanks,

Joe
0
Comment
Question by:jvieira
  • 2
4 Comments
 

Expert Comment

by:kufel
ID: 2520127
0
 

Author Comment

by:jvieira
ID: 2520270
I don't want to use linux for a firewall.  In fact I already have a firewall.  What I need is information on securing the Linux OS.  If I use my linux box as a web server without changing the default settings I'm sure I would be open to numerous types of attacks (ie DoS).  The same would go if I used it as a DB server and so on.  I was looking for information on how to secure linux depending on it's role.  The steps to secure a web server would not neccesarily be the same steps to secure a DB server.

Thanks,

Joe
0
 

Accepted Solution

by:
ohad23 earned 50 total points
ID: 2521690
Hi,
you can read all about it in: http://freshmeat.net/news/2000/02/09/950085316.html
0
 

Author Comment

by:jvieira
ID: 2532415
Thanks
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to install Ubuntu 16 in DELL venue 8 pro 20 289
Use CRON to save a copy of an open file 1 55
awk sed 8 65
CentOS 7 Linux for HP DL380 G4 32Bits 7 46
1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question