Solved

Linux Security

Posted on 2000-02-14
4
278 Views
Last Modified: 2010-04-20
Hello,

I just setup Redhat linux 6.1 as a proxy server using squid.  I seriuosly doubt that linux is a secure nos out of the box so my question is what steps do I need to take in order to make linux secure from outside (or inside) attacks.  Not just as a proxy server but as a web/db/file server.  I haven't seen any real step by step procedure for securing linux with respect to it's role.  I'm not looking for a bunch of links or documents that discuss linux security but offer no real information.

Thanks,

Joe
0
Comment
Question by:jvieira
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Expert Comment

by:kufel
ID: 2520127
0
 

Author Comment

by:jvieira
ID: 2520270
I don't want to use linux for a firewall.  In fact I already have a firewall.  What I need is information on securing the Linux OS.  If I use my linux box as a web server without changing the default settings I'm sure I would be open to numerous types of attacks (ie DoS).  The same would go if I used it as a DB server and so on.  I was looking for information on how to secure linux depending on it's role.  The steps to secure a web server would not neccesarily be the same steps to secure a DB server.

Thanks,

Joe
0
 

Accepted Solution

by:
ohad23 earned 50 total points
ID: 2521690
Hi,
you can read all about it in: http://freshmeat.net/news/2000/02/09/950085316.html
0
 

Author Comment

by:jvieira
ID: 2532415
Thanks
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you tried to learn about Unicode, UTF-8, and multibyte text encoding and all the articles are just too "academic" or too technical? This article aims to make the whole topic easy for just about anyone to understand.
In this post we will learn different types of Android Layout and some basics of an Android App.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question