Security Handbook

This is a step-by-step guide for hardening Gentoo Linux.


 * Pre-installation concerns - Why is security an important part for every server admin?
 * Tightening security - Tightening security during and after installation.
 * Logging - Choose between (at least) three different system loggers.
 * Mounting partitions - provides many security options.
 * User/Group limitations - Control system resource usage.
 * File permissions - Securing local files.
 * PAM - Pluggable Authentication Modules.
 * TCP wrappers - Control access to services.
 * Kernel security - Instructions for securing the kernel.
 * Securing services - Help on ensuring system daemons are secure.
 * Chrooting and virtual servers - Isolating servers.
 * Firewalls - A guide on packet filtering.
 * Intrusion detection - How to discover if intruders have entered a system.
 * Keeping up-to-date - Ensuring the latest security updates.