Closing the Holes

Most intruders enter systems through well-known holes in the system software. The most important thing you can do to improve the security of your system is close the holes by installing security updates as soon as they become available.

Vulnerabilities are not limited to the Linux kernel itself. In fact, most of the vulnerabilities that are exploited occur in the network software that runs on your Linux system. In the first-quarter 2002 Top Ten Vulnerabilities list at, some of the top 10 vulnerabilities are pieces of user-level software that run on Linux systems. Clearly, it is not enough to keep the Linux operating system up-to-date. You must keep all software packages updated.

Was this article helpful?

0 0

Post a comment