Here's hoping that this message is not lost in the flood of
potentially thousands of read notifications to your mailing list
post. Hope you learned your lesson on that.
These days "security" seems to consist of installing and enabling
every item you can find that's labeled "security". A huge amount of
it is pure waste, addressing mythical scenarios that no ordinary user
will ever encounter.
Real security comes from correctly analyzing your actual threat
profile, and carefully addressing real vulnerabilities, rather than a shotgun approach that misses as much as it hits.
That said, here's my own favorite treatise on server security. A bit dated, RedHat oriented, and probably not generic to your own purposes.
http://www.trinityos.com/LINUX/index-linux.html
Best of luck,
So far, this official Debian list is in line with my expectations.[...]
For every 1 person on a Debian list, there are 10 who will tell
you it's a waste of time. So far, the best "stop wasting our time"
line is that Debian is unlikely to want to write about a package
that's not in one of the repositories
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 297 |
Nodes: | 16 (2 / 14) |
Uptime: | 05:01:51 |
Calls: | 6,666 |
Files: | 12,213 |
Messages: | 5,335,947 |