tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 6

Open Source Security Tools : Practical Guide to Security Applications part 6. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 29 Wednesday June 23 2004 2 58 PM Hardening Your Security Tool System 29 3. Once you ve installed the required modules download the Bastille RPM or get it from the CD-ROM that accompanies this book. Click on it and Bastille should install automatically. Now you are ready to run Bastille to harden or lock down your operating system. Flamey the Tech Tip Run Bastille on Nonproduction Systems First Always run these tools for the first time on nonproduction or test systems. These programs might turn off services needed for a Web server or mail server to function and cause an outage. Once you ve fully tested the effect and verified that it s stable you can run them in your production environment. Running Bastille Linux 1. If you didn t select to start X-Windows at boot time when installing your OS type startx at a command prompt and the X-Windows graphical interface will display. 2. Start Bastille in Interactive mode by clicking on the Bastille icon located in usr bin bastille. You can also type bastille from a terminal window opened in X. 3. If you don t want to use Bastille in X-Windows or can t for some reason you can still run Bastille from the command line using the Curses-based user interface. Type bastille c at any command prompt. Both interfaces will give you the same result. You can also run Bastille in what is called Non-Interactive mode. This runs Bastille automatically without asking any questions from a predesignated configuration file. Every time you run Bastille a configuration file is created. You can then use it to run Bastille on other machines in Non-Interactive mode. This technique is useful for locking down multiple machines quickly. Once you have a configuration file that does the things you want simply load Bastille on additional machines and copy the configuration file onto those machines or have them access the file over the network . Then type bastille non-interactive config-file config-file is the name and location of the .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.