Thanks James!
 
-------------- Original message --------------
From: James <[EMAIL PROTECTED]>

> Brian Davis comcast.net> writes:
>
>
> > Can one covert a non-hardended machine to use the hardended-profile, or
> > do you have to start from scratch?
>
>
> Hello Brian,
>
> The short answer is YES. The correct answer is you have to
> read quite a lot (I'm in the middle of that) and decide
> which 'path/technology' you want to follow. Here's docs
> you should start looking at:
>
> http://www.gentoo.org/proj/en/hardened/primer.xml
> http://www.gentoo.org/proj/en/hardened/
>
> I choose 'SElinux' as the path to follow for me
> that makes most sense. Since the NSA was the prime
> motivator, it's an easy path to convince my clients !
> ; to follow. Although SElinux is not a complete
> solution, other complementary software combined with
> SElinux does provide for a complete (security) solution,
> almost.....
>
>
> http://www.gentoo.org/proj/en/hardened/selinux/
> http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml
> http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml?part=2
>
> hth,
> http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml?part=2
> James
>
>
>
> --
> gentoo-user@gentoo.org mailing list
>

Reply via email to