<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://tnt.aufbix.org/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>tnt.aufbix.org linux:ubuntu</title>
        <description></description>
        <link>https://tnt.aufbix.org/</link>
        <lastBuildDate>Thu, 14 May 2026 13:50:28 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://tnt.aufbix.org/ttps://tnt.aufbix.org/lib/tpl/arctic/images/favicon.ico</url>
            <title>tnt.aufbix.org</title>
            <link>https://tnt.aufbix.org/</link>
        </image>
        <item>
            <title>linux:ubuntu:hardening</title>
            <link>https://tnt.aufbix.org/linux/ubuntu/hardening?rev=1248355035&amp;do=diff</link>
            <description>FIXME!!

links: &lt;http://www.itsecurity.com/features/ubuntu-secure-install-resource/&gt; | see: &lt;http://wiki.centos.org/HowTos/OS_Protection&gt;


System Hardening Checklist

1. Disk Partitions and Mounting
  1. Separate /home, /tmp, /var/tmp from /root partitions (If only if the server has frequent access from general user except administrator).
  2. Change mount options in /etc/fstab to limit user access on appropriate filesystems.
  · Using noexec instead prevents execution of binaries on a file sys…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>linux:ubuntu</category>
            <pubDate>Thu, 23 Jul 2009 15:17:15 +0000</pubDate>
        </item>
    </channel>
</rss>
