![]() ![]() Do not execute any untrusted code on the system, especially as the root user.Įnable Security-enhanced Linux (SELinux).Do not login as the root user unless needed.Run a local firewall on the system, such as iptables, to block any unused ports.A subscription to Red Hat Subscription Management (RHN) will help keep a system updated. Keep a system updated so all patches and security updates are installed.There are also some good security practices to follow to make sure a system is safe: Another example available in Red Hat Enterprise Linux 4 and above is SELinux, which is an implementation of a mandatory access control mechanism. One example found in Red Hat Enterprise Linux 3 and higher versions is ExecShield, which helps to eliminate memory buffer overflow exploits. Red Hat Enterprise Linux also includes a set of technologies which can greatly reduce the chance of Linux-specific exploits. ![]() As security issues are discovered in various applications, Red Hat provides updated packages in a way which keeps potential risk to a minimum.įor information on Red Hat's policy on backporting security fixes see "Security Backporting Practice".įor information on Red Hat's policy on product security see "Product Security Overview". ![]() Red Hat does provide a high level of security in the operating system and packages that we distribute. Red Hat does not provide anti-virus software. Does Red Hat provide any-virus protection software?.Is any virus protection software needed for Red Hat Enterprise Linux?. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |