hal@foobox.net
v. 1.0, 2001-11-07
This document is a an overview of the basic steps required to secure a Linux installation from intrusion. It is intended to be an introduction.