Hi all!

This is a security-related question.

I will soon be retiring my old 180MHz Cyrix machine and I plan to run Red
Hat 8.0 on a new PC. My question is: how can I secure my Red Hat
installation for the first few times that I go online and download
security software (firewall scripts, tripwire, snort, psad, etc.). The Red
Hat 6.2 stock setup was quite vulnerable and I'm worried that Red Hat 8.0
will be the same. What can I do using ONLY the software in the Red Hat 8.0
package to secure my machine so no one hacks in while I'm still
downloading security software?

If anyone can give me any iptables scripts or tips on how to  activiate
any stock Red Hat scripts to secure my machine, it would be greatly
appreciated. I don't want to use the packages I've downloaded before since
the machine I used was compromised once and one can never be sure that the
packages I downloaded were not corrupted or trojaned in some way.

By the way, isn't it theoretically possible to trojan binary data files
(such as image files) so that they could be executable and be used to
compromise a system? If so, does that mean all my old binary data is
suspect?

Thanks a million. God bless!

-- [Manny Amador] -------------------------------- [[EMAIL PROTECTED]] --
   Member: Philippine League for Democratic Telecommunications, Inc.
                       "Affordable Access for All!"
-- [Open Minds Philippines] --------------- [openminds.linux.org.ph] --
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

Fully Searchable Archives With Friendly Web Interface at http://marc.free.net.ph

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to