Do you have a question? Post it now! No Registration Necessary. Now with pictures!
March 27, 2007, 1:14 pm
rate this thread
I'm not a new person at Linux security and have been using the operating
system for three to four years now, though I normally don't venture into
shells. However, I'm developing and testing a daemon that I don't quite
trust--while it is running as a restricted user, I don't quite know what
other things I should do to secure the system to make sure that a
regular user doesn't have access to files that he shouldn't. I think
that finding out what files these are would essentially be the same
steps taken to secure a shell server.
I'm also considering setting up a shell server on a separate network.
Can anyone give me some other good pointers on securing a shell server?
- » port knocking regarding the class C (/24) ranges with iptables?
- — Next thread in » Linux Security
- » Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Serv...
- — Newest thread in » Linux Security