Hacks #1-20 Section 1. Secure Mount Points Section 2. Scan for SUID and SGID Programs Section 3. Scan For World- and Group-Writable Directories Section 4. Create Flexible Permissions Hierarchies with POSIX ACLs Section 5. Protect Your Logs from Tampering Section 6. Delegate Administrative Roles Section 7. Automate Cryptographic Signature Verification Section 8. Check for Listening Services Section 9. Prevent Services from Binding to an Interface Section 10. Restrict Services with Sandboxed Environments Section 11. Use proftp with a MySQL Authentication Source Section 12. Prevent Stack-Smashing Attacks Section 13. Lock Down Your Kernel with grsecurity Section 14. Restrict Applications with grsecurity Section 15. Restrict System Calls with Systrace Section 16. Automated Systrace Policy Creation Section 17. Control Login Access with PAM Section 18. Restricted Shell Environments Section 19. Enforce User and Group Resource Limits Section 20. Automate System Updates |