Questo contenuto non è disponibile nella lingua selezionata.
3.3. Additional Resources
For more information about security updates, ways of applying them, the Red Hat Customer Portal, and related topics, see the resources listed below.
Installed Documentation
- yum(8) — The manual page for the Yum package manager provides information about the way Yum can be used to install, update, and remove packages on your systems.
- rpmkeys(8) — The manual page for the
rpmkeys
utility describes the way this program can be used to verify the authenticity of downloaded packages.
Online Documentation
- Red Hat Enterprise Linux 7 System Administrator's Guide — The System Administrator's Guide for Red Hat Enterprise Linux 7 documents the use of the
Yum
andrpm
commands that are used to install, update, and remove packages on Red Hat Enterprise Linux 7 systems. - Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide — The SELinux User's and Administrator's Guide for Red Hat Enterprise Linux 7 documents the configuration of the SELinux mandatory access control mechanism.
Red Hat Customer Portal
- Red Hat Customer Portal, Security — The Security section of the Customer Portal contains links to the most important resources, including the Red Hat CVE database, and contacts for Red Hat Product Security.
- Red Hat Security Blog — Articles about latest security-related issues from Red Hat security professionals.
See Also
- Chapter 2, Security Tips for Installation describes how to configure your system securely from the beginning to make it easier to implement additional security settings later.
- Section 4.9.2, “Creating GPG Keys” describes how to create a set of personal GPG keys to authenticate your communications.