There are several methods remote attackers can use to break into your machine. Usually they are exploiting problems with existing programs. The Linux community always quickly spots these 'exploits' and releases a fix. Linux fixes are usually out long before the equivalent programs in other operating systems are mended. The issue here though is how to prevent your machine from suffering any sort of problem of this sort. Below we will see many methods to batten down the hatches and set up a really secure Linux.
The link for this article located at LinuxPlanet is no longer available.