I would like to know 1. Is Red Hat ES exactly like Cent OS? (comparing the Security, protection, Kernel and other applications) 2. How can we find out the open ports and unwanted applications that easily intruder can hack if they are installed in a Mail server and DNS server? (details for any web site or any book) Indika Sri Lanka -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list