官术网_书友最值得收藏!

Summary

So, we've made a good start to our journey into Linux security and hardening. In this chapter, we looked at why it's just as important to know about securing and hardening Linux systems as it is to know how to secure and harden Windows systems. We provided a few examples of how a poorly-configured Linux system can be compromised, and we mentioned that learning about Linux security could be good for your career. After that, we looked at how to set up a virtualized lab environment using VirtualBox and Cygwin.

In the next chapter, we'll look at locking down user accounts, and ensuring that the wrong people never get administrative privileges. I'll see you there.

主站蜘蛛池模板: 额尔古纳市| 鹤岗市| 巩留县| 淄博市| 兴仁县| 沅陵县| 邻水| 通城县| 枝江市| 南康市| 沁源县| 景宁| 加查县| 东乌| 仁寿县| 阿鲁科尔沁旗| 平和县| 家居| 绥德县| 临沂市| 咸宁市| 邵武市| 乐都县| 炉霍县| 福安市| 宜宾县| 双鸭山市| 兴和县| 桃源县| 江都市| 安化县| 晋宁县| 广平县| 荔浦县| 紫云| 普宁市| 台南市| 济源市| 福贡县| 剑川县| 南涧|