When this paper was first released, some readers confused this paper as a comparison between Windows and Linux. That is not the case. The purpose of this paper is to make you ask the question Why is no one hacking Linux anymore?
This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that canno