𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Get Acquainted with Linux Security and Optimization System


Book ID
127444945
Year
1999
Tongue
English
Weight
1 MB
Category
Library

No coin nor oath required. For personal study only.

✦ Synopsis


This document is tailored as a step-by-step, example driven document instead of a detailed explanation document on each Linux feature. It doesn't go into much debugging aspects since the Linux Documentation Project's (LDP) HOWTOs already cover this.This document is intended for a technical audience! It's discuss how to install a RedHat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and configuration options, we will use a sourcedistribution (tar.gz) program the most possible especially for critical server software like Apache, Bind, Samba, Squid, Openssl etc.Source program will give us a fast upgrade when necessary and a customization, optimization for our specific machines that often we can't have with RPM. I have used many freely available sources to write this documentation, it seems only fair to give the work back to the Linux community. It is focused on the Intel x86 hardware, so if you are looking for PPC, ARM, SPARC, APX, etc.. features; you probably won't find what you are looking for.Minimal installation for this Server require that you recompile the kernel, other programs are specific according to your needs.


πŸ“œ SIMILAR VOLUMES


Red Hat Linux Security and Optimization
πŸ“‚ Standards πŸ“… 2002 πŸ› Hungry Minds 🌐 English βš– 1 MB

Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to apply certain patches to fix a security problem. This book shows the re

Red Hat Linux Security and Optimization
πŸ“‚ Library πŸ“… 2002 πŸ› Hungry Minds 🌐 English βš– 5 MB

Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to apply certain patches to fix a security problem. This book shows the re