mirror of
https://github.com/Zeckmathederg/glfs.git
synced 2025-02-03 23:07:23 +08:00
Tagged security.xml
git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4207 af4574ff-66df-0310-9fd7-8a98e5e911e0
This commit is contained in:
parent
5a5bbbfdb5
commit
2dbd7a5f82
@ -7,6 +7,7 @@
|
|||||||
|
|
||||||
<chapter id="postlfs-security">
|
<chapter id="postlfs-security">
|
||||||
<?dbhtml filename="security.html"?>
|
<?dbhtml filename="security.html"?>
|
||||||
|
|
||||||
<title>Security</title>
|
<title>Security</title>
|
||||||
|
|
||||||
<para>Security takes many forms in a computing environment. This chapter
|
<para>Security takes many forms in a computing environment. This chapter
|
||||||
@ -16,15 +17,15 @@ and detection.</para>
|
|||||||
<para>Access for users is usually handled by <command>login</command> or an
|
<para>Access for users is usually handled by <command>login</command> or an
|
||||||
application designed to handle the login function. In this chapter, we show
|
application designed to handle the login function. In this chapter, we show
|
||||||
how to enhance <command>login</command> by setting policies with
|
how to enhance <command>login</command> by setting policies with
|
||||||
<application><acronym>PAM</acronym></application> modules. Access via networks
|
<application>PAM</application> modules. Access via networks
|
||||||
can also be secured by policies set by <application>iptables</application>,
|
can also be secured by policies set by <application>iptables</application>,
|
||||||
commonly referred to as a firewall. For applications that don't offer the
|
commonly referred to as a firewall. For applications that don't offer the
|
||||||
best security, you can use the <application>Stunnel</application> package to
|
best security, you can use the <application>Stunnel</application> package to
|
||||||
wrap an application daemon inside an <acronym>SSL</acronym> tunnel.</para>
|
wrap an application daemon inside an SSL tunnel.</para>
|
||||||
|
|
||||||
<para>Prevention of breaches, like a trojan, are assisted by applications like
|
<para>Prevention of breaches, like a trojan, are assisted by applications like
|
||||||
<application>GnuPG</application>, specifically the ability to confirm signed
|
<application>GnuPG</application>, specifically the ability to confirm signed
|
||||||
packages, which recognizes modifications of the <acronym>TAR</acronym> ball
|
packages, which recognizes modifications of the TAR ball
|
||||||
after the packager creates it.</para>
|
after the packager creates it.</para>
|
||||||
|
|
||||||
<para> Finally, we touch on detection with a package that stores "signatures"
|
<para> Finally, we touch on detection with a package that stores "signatures"
|
||||||
|
Loading…
Reference in New Issue
Block a user