In This Chapter
With the growth of the Internet, computer and network security has become more important than ever. Assaults on your Red Hat Linux system can come in many forms, such as denial-of-service attacks, break-in attempts, or hijacking your machine as a spam relay, to name a few.
In many cases, good practices for setting and protecting passwords, monitoring log files and creating good firewalls will keep out many would-be intruders. Sometimes, more proactive approaches are needed to respond to break-ins. This chapter will familiarize you, as a Red Hat Linux administrator, with the dangers that exist and the tools necessary to protect your system.