Re: Linux system administration methodology or best pratice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks. I'll definately read these carefully.

On 8/29/09, Kristopher Kane <kristopher.kane@xxxxxxxxx> wrote:
>
> Hello,
>
> The U.S. NSA has two guides on securing RHEL5:
>
>
> http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml#linux2
>
> -Kristopher Kane
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux