Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Line: 168 to 168 | ||||||||
Hardening Linux Machineshttp://www.sans.org/score/checklists/linuxchecklist.pdfhttp://cisecurity.org/en-us/?route=downloads.benchmarks | ||||||||
Changed: | ||||||||
< < | http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml#linux2 | |||||||
> > | http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml#linux2 https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks | |||||||
http://noone.org/blog/English/Computer/Shell/How%20to%20find%20broken%20symlinks.html - How to find broken symlinks |