List of Tables


2.0 Chapter 2: Securing Linux

Table 2-1: Red Hat 7.3 Partitioning Defaults
Table 2-2: Services That Should Be Run
Table 2-3: Default Configuration File for logrotate Daemon Settings

3.0 Chapter 3: Securing Additional Services

Table 3-1: Candidate Modules for Commenting Out When Not Used
Table 3-2: Modification of Default Directory Access Permissions
Table 3-3: Modification of Default Root Access Permissions
Table 3-4: Fetching and Unpacking Sources
Table 3-5: Configuring, Building, and Installing Packages



Securing Linux. A Survival Guide for Linux Security
Securing Linux: A Survival Guide for Linux Security (Version 2.0)
ISBN: 0974372773
EAN: 2147483647
Year: 2002
Pages: 39

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net