Well LePaul, understand that virtually all Linux distributions come out of the box with minimal security precautions in place.
Once you get a handle on that then you are on your way.
I do not use RedHat due to the inconsistencies in the filesystem hierarchy that deviates from traditional UNIX's.
I like Slackware better for a Linux distribution, but then I know my way around UNIX pretty well.
Slackware does a better job of keeping the installation up to date with the latest releases of the utilites as well.
Anyway, I am an old command line interface guy, but when I use X, I prefer KDE, with the latest X distribution.
There are several things you need to do to secure the box.
Rebuild the kernel with only what you need in it. By default, the kernel has a bunch of support for devices and services you may not need.
Edit inetd.conf and comment out the services you do not want the world to have access to.
Setup the "/etc/hosts.allow" and "/etc/hosts.deny" files to further limit who can have access to what services.
Edit the /etc/services file and comment out what services you do not want to support.
Edit the /etc/ftp* files and turn orr anonymous FTP and further secure the FTP daemon.
If you are running sendmail, the please update it and make sure you have "relaying" turned off.
For BIND, make sure your named.conf file restricts who can update the DNS records you own. Also setup a forwarders entry so your DNS server knows what server immediately upstream can answer queries.
On a side note, there is a bug in the W2K DNS system which basically causes it to ignore the "try again" lookup returned from BIND. w2k treats it as a failure, instead of trying again, or trying the second DNS record for the query. No way to work around this bug and no update on when it will be fixed.
Due to this bug, if you are running a DNS and have a W2K machine in your network, you need to set BIND to notify ("also-notify") your w2k machine when you make a change to the DNS records.
There is more, but I beleive that will get you pretty secure.