Overview

Before you set up servers for real use, you should understand how to control who can access those servers. Failure to take this precaution is likely to lead to your servers being used by undesirables—perhaps to take over your system or perhaps just to use it to launch attacks on other people. This chapter begins with an overview of techniques you can use to block unwanted accesses. It then proceeds to cover several methods in greater detail: firewalls, TCP Wrappers, and xinetd. Finally, this chapter describes chroot jails, which are tools that can help prevent intruders from damaging anything if they do manage to take over a server.

Note This chapter is effectively about security. Chapter 18, "System Security," introduces many important security concepts and measures; and Chapter 21, "Detecting Intruders," describes how you can monitor your system for signs of intrusion.

Team LiB

Team LiB

^ previous

0 0

Post a comment