On Saturday 17 May 2008 01:40:05 am Rico Secada wrote: > On Sat, 17 May 2008 06:42:57 +0530 > > Raj Kiran Grandhi <[EMAIL PROTECTED]> wrote: > > Rico Secada wrote: > > > Hi. > > > > > > Why is Debian not setup to be secure be default? > > > > > > Not everyone is a security expert so imho the system should be fully > > > secured out-of-the-box. > > > > Please elaborate on what you consider to be the insecure parts of a > > default installation. Describe a process by which an etch system can > > be compromised remotely. Obviously, the ability to become root by > > tweaking the boot parameters from the grub screen does not count as a > > vulnerability. > > All I am saying is that it shouldn't be needed to harden anything. > > http://www.debian.org/doc/manuals/securing-debian-howto/
It is hardened by default. Go with the minimal base install and install what you need afterwards instead of picking a task and installing a whole bundle. -- Paul Johnson [EMAIL PROTECTED] Explaination of .pgp part: http://linuxmafia.com/faq/Mail/rant-gpg.html
signature.asc
Description: This is a digitally signed message part.