Securing Debian - the howto
First, if this is the wrong list, then tell me after reading the mail
where else I should have posted this one.
I am currently in the process of writing a HOWTO about securing your
Debian GNU/Linux installation. Some of you may say now "Du'h, we don't
need that", but in my opinion it is really necessary to have such a
The current version is available under
What I basically need right now, is input. I'm sure I forgot dozens of
points or I discussed them way too short (it's only a 23 kb text
document). So, if you have any proposals, what else should get into that
minihowto (or perhaps left out), mail me (private, please).
Alexander Reelsen http://joker.rhwd.de
email@example.com GnuPG: pub 1024D/F0D7313C sub 2048g/6AA2EDDB
firstname.lastname@example.org 7D44 F4E3 1993 FDDF 552E 7C88 EE9C CBD1 F0D7 313C
Securing Debian: http://joker.rhwd.de/doc/Securing-Debian-HOWTO