Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This guide should be titled as “Compendium of Linux Hardening”.

It is not for the average system admin nor targeting a specific system usage model such as desktop workstation, embedded, or router/gateway/switch.

Given that, this guide is a very useful summary, which of course is only for the seasoned security developers and admin can use.

The rest of you can tread lightly.



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: