Part 1: Discuss in detail several effective local security practices to harden your Linux distribution.
Part 2: Discuss what is SSH and the advantages and disadvantages of using it on your Linux distribution.
Also discuss how to control ssh access and how you configure this service.
Part 3: Please provide one example of a Linux Based (i.e. router, hypervisor, appliance, etc.) system.
Provide a brief product description, use, and function.
Part 4: Discuss how you would use the lsof command. Provide some command examples