Articles Blog | G5 Cyber Security

Research – Securing-Optimizing-RH-Linux-1_2.pdf

Securing and Optimizing Red Hat Linux – This documentation is indispensable for peoples that want to get all advantage, security, and optimization of a Linux Server. Features Free/SWAN section, Quota configuration, Portsentry, Logcheck, section, improved firewall security approach, more system security tips and a lot other changes. This is the version 1.2 released the March 17, 2000.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/17209/Securing-Optimizing-RH-Linux-1_2.pdf

Source: https://packetstormsecurity.com/files/17209/Securing-Optimizing-RH-Linux-1_2.pdf.html

Exit mobile version