Agenda Overview Before connecting to the Internet Security Profiles Network Services Best Practices using: DNS (using ISC Bind) HTTP, HTTPS (using Apache) Shell access (via ssh) Anonymous FTP Recovering from a UNIX System Compromise Setting Up and Using Secure IP (IPsec) Conclusion