Summary

Summary

With the rise of the Internet, security has become a critical issue for nearly all computer users. Properly using passwords, securely configuring network services, and monitoring log files are critical ways of keeping your computer secure.

Using encryption keys you can help verify the authenticity of those you communicate with, as well as make the data you transmit more secure. With tools such as LogSentry and PortSentry, you can protect your Red Hat Linux system from intrusions.




Part IV: Red Hat Linux Network and Server Setup