Book Image

Practical Linux Security Cookbook

By : Michael A Lindner, Tajinder Kalsi
Book Image

Practical Linux Security Cookbook

By: Michael A Lindner, Tajinder Kalsi

Overview of this book

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
Table of Contents (17 chapters)
Practical Linux Security Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Using Squid proxy


Squid is a web proxy application with a variety of configurations and uses. Squid has a large number of access controls, and supports different protocols, such as HTTP, HTTPS, FTP, SSL, and so on.

In this section we will see how to use Squid as an HTTP proxy.

Getting Ready

To install and use Squid on a particular system on a network, ensure that the particular system has enough physical memory, because Squid also works as a cache proxy server and thus needs space to maintain the cache.

We are using a Ubuntu system for our example and Squid is available in Ubuntu repositories, so we need to ensure that our system is up to date. For doing this we run the following command:

apt-get update

After that, run the following command:

apt-get upgrade

How to do it...

To install and configure Squid on our system, we have to take the following steps:

  1. The first step is to install the squid package, and to do so, we run the command as follows:

  2. As soon as the installation of Squid completes, it...