Setting up Ksplice with internet access
Before we get into the recipe, let’s understand what’s all the fuss around Ksplice.
What’s all the fuss about Ksplice?
The first question is, Why is this important to IT, and more importantly, to defending the applications running on the servers? Before we get to that, you first need to understand the process that hackers use to compromise systems.
The basic process includes three main stages: reconnaissance, gaining access, and then maintaining access. Once a system is compromised, the process is repeated on other systems on the network:
Figure 7.1 – Security life cycle
In the first phase, reconnaissance, hackers use a variety of methods to scan the system for vulnerabilities. Often, this attacking phase against servers starts after hackers have gained access to a low-level support account that has access to the server. Once there, it is a trivial task to look at the kernel version...