It seems like every other day of the week, my networks are attacked by compromised Linux hosts. Granted, this is not nearly as many as the attacks coming from compromised Windows hosts. This is to be expected of Windows, which offers no real way of truly securing the operating system. But with a flexible, modular and well-designed system like Linux, there is no excusable reason. The primary cause of compromised Linux hosts is not a lack of security on the platform itself, but a lack of attention to security by the one deploying the server. With this in mind, I present a guide on how not to configure your Linux host. Read more...