Unlimited Plugins, WordPress themes, videos & courses! Unlimited asset downloads! From $16.50/m
  • Overview
  • Transcript

2.4 Configuration Defaults

Almost all software comes with a set of security instructions for hardening the configuration settings. Typically most machines are installed with loose permissions that we are expected to harden later. This is done because the hardened settings make debugging and configuration more difficult.

In this lesson, I’ll cover the basics of Cloud9 and discuss in depth how to use permissions on a Unix system. I’ll also dive into configuration settings for Apache, SSL and Redis.

Related Links