| Originally published: Saturday, 26 August 2000 | Author: Alexander Reelsen |
| Published to: news_enhance_security/Security News | Page: 1/1 [Printable] |
How to create a Secure InstallIt's important to be aware that when you're installing Linux, you're installing a powerful server operating system. As a home user, you probably won't use much of what's installed by default, and anything you don't use is a security risk you don't have to take. This means that most of the install procedure for a user like you or I actually involves not installing things, and then configuring the remaining elements as securely as possible
|
|
| Page 1 of 1 | |
|
(this article had no body text) | |