For sake of discussion, assume a fresh base desktop install of the OS (Fed/RHEL/Centos). After doing the install from the iso(s), you install : -rkhunter -chkconfig You then go through the services, and disable any services you don't need/want. You then mod SSH as required to disable root login OK, what else should you do? Regarding rkhunter, is it simply a process to allow you to detect if anything "file" has been changed, so you can then go back to the previous backup? Are there any linux apps/services (ala what's on Windows) to "detect/prevent" rootkits/being hacked? I've looked over a bunch of webdics/articles, and thought it might be useful to have a thread on this here, as I'm currently going through this process. Thoughts/Comments Welcome Thanks -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org