Securing Linux Distros Part 2
In the last post we've covered mainly securing the boundary of the Ubuntu operating system, now we will go over more of the internal permissions and lock down certain aspects of the Ubuntu OS that can be used to elevate permissions. We will start by making sure the