Securing-Optimizing-RH-Linux-1_2_76
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca
© Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ®
76
Chapter 5 Configuring and Building a secure, optimized Kernels
In this Chapter
Linux Kernel
Making an emergency boot floppy
Securing the kernel
Kernel configuration
Installing the new kernel
Delete program, file and lines related to modules
Making a new rescue floppy
Update your /dev entries