本文共 920 字,大约阅读时间需要 3 分钟。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided. http://rapidshare.com/files/9673251/1931769508.rar http://mihd.net/d3hqva http://rapidshare.com/files/9961281/1931769508.zip