Red Hat ENTERPRISE LINUX 5 - DEPLOYMENT Deployment Manual page 15

Hide thumbs Also See for ENTERPRISE LINUX 5 - DEPLOYMENT:
Table of Contents

Advertisement

40. Manually Upgrading the Kernel
40.1. Overview of Kernel Packages .......................................................................... 551
40.2. Preparing to Upgrade ...................................................................................... 552
40.3. Downloading the Upgraded Kernel ................................................................... 553
40.4. Performing the Upgrade .................................................................................. 553
40.5. Verifying the Initial RAM Disk Image ................................................................ 554
40.6. Verifying the Boot Loader ................................................................................ 554
40.6.1. x86 Systems ........................................................................................ 554
40.6.2. Itanium Systems .................................................................................. 555
40.6.3. IBM S/390 and IBM System z Systems ................................................. 556
40.6.4. IBM eServer iSeries Systems ............................................................... 556
40.6.5. IBM eServer pSeries Systems .............................................................. 556
41. General Parameters and Modules
41.1. Kernel Module Utilities .................................................................................... 559
41.2. Persistent Module Loading .............................................................................. 561
41.3. Specifying Module Parameters ........................................................................ 562
41.4. Storage parameters ........................................................................................ 562
41.5. Ethernet Parameters ....................................................................................... 567
41.5.1. Using Multiple Ethernet Cards .............................................................. 574
41.5.2. The Channel Bonding Module ............................................................... 574
41.6. Additional Resources ...................................................................................... 580
41.6.1. Installed Documentation ....................................................................... 580
41.6.2. Useful Websites ................................................................................... 580
VII. Security And Authentication
42. Security Overview
42.1. Introduction to Security ................................................................................... 583
42.1.1. What is Computer Security? ................................................................. 583
42.1.2. Security Controls .................................................................................. 585
42.1.3. Conclusion ........................................................................................... 586
42.2. Vulnerability Assessment ................................................................................. 586
42.2.1. Thinking Like the Enemy ...................................................................... 586
42.2.2. Defining Assessment and Testing ......................................................... 587
42.2.3. Evaluating the Tools ............................................................................. 588
42.3. Attackers and Vulnerabilities ............................................................................ 591
42.3.1. A Quick History of Hackers ................................................................... 591
42.3.2. Threats to Network Security .................................................................. 592
42.3.3. Threats to Server Security .................................................................... 592
42.3.4. Threats to Workstation and Home PC Security ....................................... 594
42.4. Common Exploits and Attacks ......................................................................... 595
42.5. Security Updates ............................................................................................ 597
42.5.1. Updating Packages .............................................................................. 598
43. Securing Your Network
43.1. Workstation Security ....................................................................................... 603
43.1.1. Evaluating Workstation Security ............................................................ 603
43.1.2. BIOS and Boot Loader Security ............................................................ 603
43.1.3. Password Security ............................................................................... 605
43.1.4. Administrative Controls ......................................................................... 611
43.1.5. Available Network Services ................................................................... 617
551
559
581
583
603
xv

Advertisement

Table of Contents
loading

Table of Contents