Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Linux : Education - Tutorials
LPI certification 102 exam prep, Part 3
ZIPPDF (letter)PDF (A4)e-mail
Main menuFeedbackNext
 
  
Security overview
 1. Introduction
 2. File permissions for log files
 3. File permissions for root's other files
 4. File permissions for user files
 5. Finding SUID/SGID programs
 6. Setting user limits with ulimit
 7. Setting CPU time limits with ulimit
 8. User limits, continued
 9. Intrusion prevention
 10. Turning off unused network services (superserver)
 11. Turning off unused network services (standalone servers)
 12. Testing your changes
 13. Refusing logins for maintenance
 14. Introducing iptables (ipchains)
 15. iptables and Linux packet filter
 16. Intrusion detection - syslogs
 17. Intrusion detection - tripwire
 18. Intrusion detection - portsentry
 19. General guidelines: keeping software up to date
 20. General guidelines: high-quality passwords
 21. General guidelines: testing your security
Privacy Legal Contact