Brunner, Brian T. wrote:
>> > over the next several weeks, i'm teaching some courses in
>> > RHEL admin but (unsurprisingly) i'll be using centos 5.5.
>> > it's a decently-written, 3rd party course, all the generic,
>> > standard admin topics but it does leave me about a 1/2 day
>> > to throw in any cool stuff i want to add.
>> > so, any recommendations for neat things that people here
>> > have done
>
> For me: I'd want to have a closer look at things that *might* give
> advantages but DO bring troubles:
> SEL
> KVM
>
> And dangers such as
> DoS
> DDoS
> Zombie computers randomly port-scanning
> Internal user ignorance, apathy, malice, and mis-information about how
> to secure the campus network from the hostile world.
> A boss who does not understand what he wants, but he wants it real bad.
Which leads back to what I suggested - an overview of the architecture of
*Nix. I worked in a division of a telecom once that some of the 27 teams
had files *everywhere* (including /), and everyone had the root
password....
mark