Advertisement
Membership
Login
ACCU Buttons
Search in Book Reviews
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
Susceptible it certainly is, according to this author. Problems can stem right from kernel compilation to setting up user accounts. (Hontañón points out that most hacking takes place behind firewalls and by legitimate users!)
There is a wealth of material covered here; things to watch while configuring samba, apache, network security, sendmail, user authentication, transport and application layer firewalls, ssh and vpn. The material is well organised and presented clearly.
I do have some petty criticisms: some diagrams have essential text missing, screen shots, while pretty, add little to the understanding. Listings are too long (4 pages), deliver little and could be relocated to an appendix. Like anyone trying to hedge their bets, he does not come down in favour of any particular Linux distribution. Kernel re-compilation is an essential part of Linux security and very much part of Linux culture. Hontañón recommends kernel compilation as root. This contradicts the advice given by Linux gurus on the Step by Step site (see http://linux.ns/misconstrue.html). Otherwise this is a good and useful read, certainly recommended. With Linux playing an increasing role in commercial web servers, this text has a ready market.