A secure Linux server depends on how the administrator configures it to be. Once we have eliminated the potential securities risk by removing RPM
services not needed, we can start to secure our existing services and software on our server. In this chapter we will discuss some of the more general, basic techniques used
to secure your system. The following is a list of features that can be used to help prevent attacks from external and internal sources.