Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base

0

RHEL6 Installation and Security Bench Marking Recommendations – Part7

Configuring User Accounts and Environment This section provides guidance on setting up secure defaults for system and user accounts and their environment. Guidance for monitoring these settings and others that may change over time is provided in Section 10 System Maintenance.

0

RHEL6 Installation and Security Bench Marking Recommendations – Part5

Logging and Auditing The items in this section describe how to configure logging, log monitoring, and auditing, using tools included with RHEL6. It is recommended that rsyslog be used for logging (with logwatch providing summarization) and auditd be used for auditing (with aureport providing summarization) to...

0

Bash Scripting – Controlling the Loop

You might be tempted to think that after you start a loop, you’re stuck until the loop finishes all its iterations. This is not true. A couple of commands help us control what happens inside of a loop: The break command The continue command Each command...

0

RHEL6 Installation and Security Bench Marking Recommendations – Part3

Configuring and Tuning Special Purpose Services This section describes services that are installed on servers that specifically need to run these services. If any of these services are not required, it is recommended that they be disabled or deleted from the system to reduce the potential...

 
Close
  Our next learning article is ready, subscribe it in your email

What is your Learning Goal for Next Six Months ? Talk to us