RECOMMENDED: FOR ANY KIND OF "COLLEAGUES"
. Boot, reboot, and shutdown the system normally
. Diagnose and correct problems at boot
. Boot systems into different runlevels for troubleshooting and system maintenance
. Use single-user mode to gain access to a system for which the root password is not known
. Diagnose and correct misconfigured networking settings
. Diagnose and correct hostname resolution problems
. Diagnose and address permissions problems and SELinux policy violations
. Diagnose and correct non-hardware disk storage problems
. Adding new partitions, logical volumes, filesystems, and swap areas to a system non-
. Manually open, mount, unmount, and close LUKS-encrypted filesystems
. Extend existing unencrypted ext4-formatted logical volumes
. Login or switch user to the root account
. Use ssh and VNC to access remote s…
Public networks like the Internet are dangerous places. Anyone who has a computer attached to the Internet (even transiently) understands these dangers. Attackers can exploit insecurities to gain access to a system, to obtain unauthorized access to information, or to repurpose a computer in order to send spam or participate in attacks on other high-profile systems (using SYN floods, as part of a Distributed Denial of Service attacks).
Distributed Denial of Service (DDoS) attacks are orchestrated from many systems across the Internet (so-called zombie computers) to consume resources on the target system and make it unusable for legitimate users (exploiting TCP's three-way handshake). For more information on a protocol that removes this ability by using a four-way handshake with cookies (Stream Control Transmission Protocol [SCTP]), see the Resources section.
The origin of SELinux
SELinux is a product of government and industry, with design and development provided by …