Enjoy Slackware 15.0!
Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
howtos:security:start [2013/01/23 02:33 (UTC)] nyteowl [File System Security] |
howtos:security:start [2022/05/11 18:11 (UTC)] (current) zeebra [Network security] |
||
---|---|---|---|
Line 6: | Line 6: | ||
This section contains articles related to securing your Slackware based system and network. | This section contains articles related to securing your Slackware based system and network. | ||
- | <note tip> | + | <note tip> |
====== Security ====== | ====== Security ====== | ||
Line 15: | Line 15: | ||
===== Network security ===== | ===== Network security ===== | ||
* Firewall | * Firewall | ||
- | * Protecting SSH connections from brute-force attacks: | + | * Protecting SSH connections from brute-force attacks: |
* Use only SSH keys instead of passwords for SSH connections: | * Use only SSH keys instead of passwords for SSH connections: | ||
* Network services: the following services can be tweaked: | * Network services: the following services can be tweaked: |