This document describes the process of securing and hardening the default Debian installation. It covers some of the common tasks to set up a secure network environment using Debian GNU/Linux. It also gives additional information on the security tools available as well as the work done by the Debian security team.
Copyright © 2002 Javier Fern�ndez-Sanguino Pe�a
Copyright © 2001 Alexander Reelsen, Javier Fern�ndez-Sanguino Pe�a
Copyright © 2000 Alexander Reelsen
Permission is granted to copy, distribute and/or modify this document under the
terms of the GNU Free
Documentation License, Version 1.1
or any later version published by
the Free Software Foundation. It is distributed in the hope that it will be
useful, but WITHOUT ANY WARRANTY.
chroot
Chroot
environment for SSH
Securing Debian Manual
2.6 10 October 2002Wed, 18 Sep 2002 14:09:35 +0200[email protected]