How to Cheat at Securing Linux


  • James Stanger, Member of CompTIA's Linux+ Advisory Committee, Chair of Linux Professional Institute Advisory Council, Phoenix, AZ

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
View full description


System administrators and security professionals running Linux Servers who use Snort, Nessus, and Wireshark in conjunction with other security tools to identify and stop potentially malicious traffic crossing networks ranging in size from fewer than 10 machines up to enterprise-class networks with tens of thousands of systems.


Book information

  • Published: October 2007
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-207-2

Table of Contents

Chapter 1: Introduction to Open Source SecurityChapter 2: Hardening the Operating SystemChapter 3: System Scanning and ProbingChapter 4: Implementing an Intrusion Detection SystemChapter 5: Troubleshooting the Network with SniffersChapter 6: Unearthing RootkitsChapter 7: Defending Against MalwareChapter 8: Defending DatabasesChapter 9: Network Authentication and EncryptionChapter 10: Avoiding Sniffing Attacks through EncryptionChapter 11: Creating Virtual Private NetworksChapter 12: Implementing and Maintaining a Firewall