Securing and Optimizing Linux: RedHat Edition -A Hands on Guide
PrevNext

5. Software -Security

Spoonbill

The next Two parts will exclusively deal with the Software other than the one's which the Linux distribution, in our case Redhat Linux, may or may not provide as a part of its core distribution. In some cases it may be provided as an extra but may come as pre-compiled binary which may not exactly suit your purpose. Hence we have in most cases used source packages usually packed as tar gzipped -*.tar.gz or in some recent case in tar bzipped -*.tar.bz2 format. This gives us the maximum available choices to tweak, choose and delete the options within these Softwares. Just a word about the *.tar.gz and *.tar.bz2, the contents are same except that the compression used is different and the bz2 extention is smaller in size as compressed format.

Table of Contents
13. Linux -The Compiler functionality
13.1. The necessary packages
13.2. Why choose tarballs?
13.3. Build, Install software on your system
14. Software -Security/Monitoring
14.1. sXid
14.2. Configure and Optimize sXid
14.3. Logcheck
14.4. Configure and Optimize Logcheck
14.5. PortSentry
14.6. Configure and Optimise Portsentry
14.7. Test fire your PortSentry

PrevHomeNext
IPCHAINS Administrative ToolsLinux -The Compiler functionality

AltStyle によって変換されたページ (->オリジナル) /