• Server Security Considerations
  • File Permissions
  • Process Ownership
  • Network Considerations
  • Value of Privileged Ports
  • Selective Binding
  • Port Obfuscation
  • TCP Wrappers