Introduction
Linux is a complete multitasking, multiuser, just like any other UNIX variant. This means that multiple users can simultaneously access the same computer system, running multiple independent programs. The Linux kernel is programmed to use special features of the Intel 80386 protected mode. In particular, Linux uses memory management features of these processors and multitasking.
History
All computer users need a document preparation system: editing and manipulating text and production of printed copies thereof, containing additional drawings, tables and images. These requirements are in most cases the minimum functionality that users expect from a computer system.
Installing a server Linux is a fairly simple matter. But things get a little more complicated when searching for a professional solution. Although Linux servers are usually very reliable, maintenance is necessary: on the one hand, to keep your system up to date with security updates (threats and solutions appear almost daily, so that securing a server is not isolated operation, but an ongoing process) and secondly because it needs a server and user options are dynamic and evolve over time.
Features
You have a server Linux operating in about 20 minutes. Installation can be done using the CD-ROM that is connected to a Windows computer on a network.
To install a server Linux before all, you and must be authenticated by the root user to install the server (in some cases, if you are logged on with an ordinary user, it is possible to give error during installation / upgrade).
The security of a server Linux is very important to protect your data, customers, intellectual property, time and money not least - the hands of crackers (hackers). Responsible for system security of a server Linux are the administrators. To secure and install a server Linux you must encrypt data transmitted whenever possible, using your password or certificates. Under most network configurations, user names, passwords, commands FTP / telnet / rsh and transferred files can be captured by anyone on same network using a packet sniffer. The common solution to this problem is to either use OpenSSH, SFTP or FTPS (FTP over SSL), which adds SSL or TLS encryption to FTP. Run the following command to delete NIS, rsh and other outdated service:
Tips and comments
# Yum erase inetd xinetd ypserv tftp-server telnet-server rsh-server
Applying security patches is an important part in maintaining the Linux server that offers all the tools to keep your system updated, and also allows easy upgrade between versions of implementing this. All security updates should be reviewed and applied as soon as possible. Again, use the RPM package manager like yum, apt-get, dpkg, up2date, and YaST to apply all security updates.
You must protect console access for your server Linux physically. Configure the BIOS and disable the booting from external devices such as DVD / CD / USB. Set grub boot loader in the BIOS password to protect these settings. Your server Linux must be locked in IDC (Internet Data Center), and all persons must pass some kind of security checks before accessing the server.
For secure email servers you can use SSL certificates and GPG keys for communication by e-mail server and client.
These are the basic things that must be made to use a server Linux.