Configuring TCP wrappers (tcpd) using /etc/hosts.allow and /etc/hosts.deny can enhance security for daemons controlled by inetd.
tcpd is often configured to deny access to all systems for all services (a blanket deny), then specific systems are specified for legitimate access to services (limited allow).
tcpd logs using syslog, commonly to /var/log/secure.
find can perform searches for file attributes such as SUID using the -perm option.
RPM packages are verified using the Verify mode, enabled using the -V (capital) option.
The output for each package contains a string of eight characters that are set to dots when the attribute has not changed. The columns represent each of eight different attributes: MD5 checksum, file size, symlink attributes, the file's mtime
, device file change, user/owner change, group change, and mode change.
Enabling the use of shadow passwords can enhance local security by making encrypted passwords harder to steal.
The use of shadow passwords causes the removal of password information from the publicly readable passwd file and places it in shadow, readable only by root.
A similar system is implemented for shadow groups, using the gshadow file.