Selasa, 25 Oktober 2011

Securing Debian Manual Chapter 5 - Securing services running on your system

Services can be secured in a running system in two ways: Making them only accessible at the access points (interfaces) they need to be in. Configuring them properly so that they can only be used by legitimate users in an authorized manner. Restricting services so that they can only be accessed from a given place can be done by restricting access to them at the kernel (i.e. firewall) level, configure them to listen only on a given interface (some services might not provide this feature) or using some other methods, for example...

Surat Elektronik

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false IN X-NONE X-NONE ...