ACCU Home page ACCU Conference Page
Search Contact us ACCU at Flickr ACCU at GitHib ACCU at Facebook ACCU at Linked-in ACCU at Twitter Skip Navigation

Search in Book Reviews

The ACCU passes on review copies of computer books to its members for them to review. The result is a large, high quality collection of book reviews by programmers, for programmers. Currently there are 1949 reviews in the database and more every month.
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
    View all alphabetically
Hardening Linux
Terpstra, Love, Reck and Scanlon
Ian Bruntlett
Appeared in:

I took this book out of the library because I wanted to introduce a Linux box to a LAN that has broadband internet access. I've got to admit the corny looking cover did put me off this book.

To coin a phrase, this is an "Oh, wow!" book. From the little experience I've got, this book covers most if not everything. It certainly covers everything I know about Linux security. And it documents commands and practices that generic Linux primers seem to ignore. That alone makes this book worth buying if you have a Linux box attached to the internet. A word of warning though - this book only covers Red Hat and SuSE Linux. I mainly use SuSE and dabble with other distros - some of the recommendations will still apply to non-Red Hat, non-SuSE Linux systems. Actually this book takes security to the extreme of describing how enterprises should handle security. It's that good.

One of the key aspects of hardening a Linux box is to limit the system services running - the logic being, if it isn't running, it can't be hacked. It also recommends that compilers are kept on safe machines. If you have a machine that might be hacked, then try not to make life easier for the hackers by giving them access to development tools on a compromised system.