HostedDB - Dedicated UNIX Servers

Securing-Optimizing-RH-Linux-1_2_76
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca © Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ® 76 Chapter 5  Configuring and Building a secure, optimized Kernels In this Chapter Linux Kernel Making an emergency boot floppy Securing the kernel Kernel configuration Installing the new kernel Delete program, file and lines related to modules Making a new rescue floppy Update your “/dev” entries