For sake of discussion, assume a fresh base desktop install of the OS
(Fed/RHEL/Centos).

After doing the install from the iso(s), you install :
-rkhunter
-chkconfig

You then go through the services, and disable any services you don't need/want.
You then mod SSH as required to disable root login

OK, what else should you do?

Regarding rkhunter, is it simply a process to allow you to detect if
anything "file" has been changed, so you can then go back to the
previous backup?

Are there any linux apps/services (ala what's on Windows) to
"detect/prevent" rootkits/being hacked?

I've looked over a bunch of webdics/articles, and thought it might be
useful to have a thread on this here, as I'm currently going through
this process.

Thoughts/Comments Welcome

Thanks
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to