office politics
It's all just 1s and 0s
- Messages
- 6,555
- Location
- in the lab
link:
Yosti! Blog: Hardening a linux server
Yosti! Blog: Hardening a linux server
The post is divided in two parts. In the first part, we will play some sort of role playing game. You will be the cruel and merciless attacker, trying to gain access to some of our machines for your dark purposes. We, on the other hand, will try to play the role of the humble and responsible system administrators, always struggling to keep up with the latest technologies and new generations of computer scientists.
After the play, you will find some practical advice on how to put what you learned into practice. If you already have some experience with Linux and security, you should skip directly to that part for the short version of the story.
Note that we will be giving out commands that work on Debian and will likely work on other Debian based distributions, like Ubuntu. If you use something else, it shouldn't be too hard to adapt them.