Click here to start

Table of contents

Title

Agenda

Introduction

Services

Accounts

Passwords

Importance

Selection 1

Selection 2

methods

policies

Shadows

Shadowing

Shadow fields 1

Shadow fields 2

Shadow advantages

Shadow Conversion

Other commands

AcctSec

protect

Guest

Wellknown 1

Wellknown 2

root

Groups

permissions

chmod

chown

files

directories

suid

ProtSUID

ports

patches

Updates

logs

LogWatch

LogWatch 2

LogWatch3

Other security programs

References

More References

Author: Luis Guzman and Paul Gossett

Homepage: http://www.cinlug.org/

Download presentation