From e15c9bc3b4ebaa113dabe2344f6514fe0a195b3c Mon Sep 17 00:00:00 2001 From: "Martin A. Brown" Date: Wed, 27 Jan 2016 22:37:39 -0800 Subject: [PATCH] DocBook SGML markup fix ( to ) Replacing the Linuxdoc tag with the SGML tag solved the validation problem for this document. --- .../docbook/lame/linux-admin-made-easy.sgml | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/LDP/guide/docbook/lame/linux-admin-made-easy.sgml b/LDP/guide/docbook/lame/linux-admin-made-easy.sgml index 88a776cf..af6a69d9 100644 --- a/LDP/guide/docbook/lame/linux-admin-made-easy.sgml +++ b/LDP/guide/docbook/lame/linux-admin-made-easy.sgml @@ -4568,21 +4568,21 @@ are necessary for moving to 2.2.x is available at http://www-stu.calvin.edu/~clug/users/jnieho38/goto22.html; I will attempt to summarize the information below (items marked with a leading -``**'' indicate you will most likely need to +``✶'' indicate you will most likely need to upgrade the item for Red Hat 5.2; items not indicated as such are probably okay but probably worth checking). -** initscripts-3.78-2.4 or +initscripts-3.78-2.4 or better (Type ``rpm -q initscripts'' to check your version) -** modutils-2.1.121 or +modutils-2.1.121 or better (Type ``rpm -q modutils'' to check your version) -** mount-2.9-0 or better +mount-2.9-0 or better (Type ``rpm -q mount'' to check your version) @@ -4607,13 +4607,13 @@ glibc'') procps-1.2.9 or better (``rpm -q procps'') -** procinfo-15 or better +procinfo-15 or better (``rpm -q procinfo'') psmisc-17 or better (``rpm -q psmisc'') -** net-tools-1.50 or +net-tools-1.50 or better (``rpm -q net-tools'') loadlin-1.6 or better (Needed only if @@ -4651,7 +4651,7 @@ with a modem and PPP.) client to connect to the Internet, such as with a cable modem). -** util-linux-2.9.0 +util-linux-2.9.0 (``rpm -q util-linux'') setserial-2.1 or better @@ -4796,11 +4796,11 @@ the scope of this document. the configuration file to thwart off spammers. These include: -O PrivacyOptions=authwarnings +O PrivacyOptions=authwarnings change to: O PrivacyOptions=authwarnings,noexpn,novrfy -O SmtpGreetingMessage=$j Sendmail $v/$Z; $b +O SmtpGreetingMessage=$j Sendmail $v/$Z; $b change to: O SmtpGreetingMessage=$j Sendmail $v/$Z; $b NO UCE C=xx L=xx @@ -5211,7 +5211,7 @@ security: -Upgrade system tools, applications, and kernel: +Upgrade system tools, applications, and kernel: By far the most common cause of system break-ins is by not exercising diligence in keeping an up-to-date server. Performing regular upgrades of the system kernel, tools and utilities will ensure that your system is not @@ -5220,19 +5220,19 @@ details on keeping an up-to-date server, see , as well as . -Shadow passwords: You should definitely be using +Shadow passwords: You should definitely be using Shadow passwords; switching to this password format is easy! For details, see . -Smart password management: Make sure passwords, +Smart password management: Make sure passwords, especially for users you are providing with shell access, are strong and changed often. Also, if you use multiple servers, resist the temptation to use the same password for all of them (otherwise, if a cracker breaks into one server using a discovered password, he or she can break into them all). -Use secure shell (ssh): Switch to using ``ssh'' +Use secure shell (ssh): Switch to using ``ssh'' instead of ``telnet''. Telnet is insecure for two reasons: One, sessions are unencrypted, which means everything, including username and passwords, are transmitted as clear text. Second, an open telnet port is one of the @@ -5310,7 +5310,7 @@ servers and one insecure one is a waste of time, especially if you are foolish enough to use the same password for more than one server. -Restrict access to external services: Next, you +Restrict access to external services: Next, you should edit the ``/etc/hosts.allow'' as well as the ``/etc/hosts.deny'' file to restrict access to services to external hosts. Here is an example of how @@ -5339,7 +5339,7 @@ in.ftpd: ALL -Turn off and uninstall unneeded services: Edit +Turn off and uninstall unneeded services: Edit your ``/etc/inetd.conf'' file, and disable (ie. comment out using a ``#'' character) any services that are not needed (if you're using ssh as recommended @@ -5348,7 +5348,7 @@ done so, as root type ``/etc/rc.d/init.d/inet restart'' to restart the inetd daemon with the changes. -Install a security detection system: Consider +Install a security detection system: Consider installing security programs such as ``Tripwire'' (see http://www.tripwiresecurity.com/) which can detect intrusions, and @@ -5356,7 +5356,7 @@ http://www.tripwiresecurity.com/) which can detect intrusions, and http://www.psionic.com/abacus/) which can help prevent them. -Due diligence: Keeping your eye on your system, performing +Due diligence: Keeping your eye on your system, performing random security audits (which can be as simple as checking for suspicious entries in the password files, examining your process list, and checking your log files for suspicious entries) can go a long way towards keeping