Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ 5 tips to improve your Linux desktop security     - The SVN installation, configuration and start - up under Linux (CentOS 6.5) (Server)

- Debugging with GDB tool Go (Programming)

- Mistakenly deleted redo log file group being given the lead to start the database ORA-03113 (Database)

- Bitmap memory footprint of computing Android memory optimization (Linux)

- Partition contrast manifestations under Windows and Linux (Linux)

- Swift notes - let you two hours to learn Swift (Programming)

- Restore database fault encountered ORA-0600 (Database)

- CentOS install expect (Linux)

- Unetbootin make use U disk loading Linux system (Linux)

- Wireshark basic introduction and learning TCP three-way handshake (Linux)

- Linux / Unix desktops interesting: Christmas tree on the terminal (Linux)

- Use libpq under Ubuntu 14.04 (Linux)

- Grub2 Boots the openSUSE installation image (Linux)

- Use FFmpeg processing high quality GIF (Programming)

- Java concurrent programming using the synchronized keyword ReentrantLock alternative primitive (Programming)

- Several configuration changes illustrate deployment of PHP (Server)

- shellinabox: one uses AJAX Web-based terminal emulator (Linux)

- Ubuntu rights management common commands (Linux)

- Integrated security administrator Linux accident management (Linux)

- jQuery get value drop-down list and select text (Programming)

 
         
  5 tips to improve your Linux desktop security
     
  Add Date : 2018-11-21      
         
         
         
 

1, select whole disk encryption (FDE).

Today, Linux operating system, application server increasingly widespread, and system security issues attendant is facing. A growing number of computer criminals have learned how to hack Linux servers to steal data. If you are running a Linux desktop, then how to protect the security of the system do?

Here are five simple steps to enhance the security of your Linux system.

1. Select the Full Disk Encryption (FDE)

No matter which operating system you are using, we recommend that you encrypt the entire hard disk.

If you are hungry laptop is lost or stolen, with a simple login and password can not protect your data security, a thief can use the USB secret key directly into your Linux system to steal data, without going through password.

By encrypting your hard drive, you can ensure that your data is safe, because if there is no thief will not be able to read what FDE password.

FDE encrypted home folder of your knowledge, you do not have to worry about the temporary files, swap files, or other directory files are accessed in case you do not have consciousness.

In Ubuntu and Fedora and many Linux distributions, all rights Dish encryption is used during the installation. You can choose whether to activate it at the time of installation.

Of course, remember to select a correct password!

2. Update software to keep up

Similarly, no matter what operating system you use, you should keep the operating system applications, such as Web browsers, PDF reader and video player software is up to date.

Most Linux distributions is very easy to achieve.

On Ubuntu, by default, the system will automatically install updates.

kneading can double-check the system settings -- Software Update -- updates.

You want to make sure important security updates option is open.

3. Learn to use Linux firewall

Linux kernel includes a firewall component, called iptables, it gives you a powerful way to manage network traffic, and keep a lot of variety of network attacks.

On Ubuntu you will have also called a simple firewall (UFW) applications, front-end program simplifies the iptables settings.

UFW is disabled by default, but you can do open it at a command prompt:

To learn more about iptables and what it can do, you might try a graphical configuration tool, such as a front-end GUFW or UFW.

On Fedora, you will find FirewallD, which is the default alternative to firewall management tools enable FirewallD called firewall configuration; you can install from the command prompt:

4. Tighten the secure browser

many free extensions can improve your browser, but it also brings security privacy issues, whether you use the Mozilla Firefox browser, Google Chrome or other browsers.

5. Using antivirus software

The reason to mention this last point, because in this way has a lot of controversy.

Some people will tell you, the Linux operating system security anti-virus software is meaningless. In fact, this is a very wrong idea.

Why not? If you pass an infected file is infected to other files, so if you have antivirus software, you can protect your system no longer be attacked. Reduce your risk of being attacked.

     
         
         
         
  More:      
 
- Ubuntu under VirtualBox virtual machine serial port settings (Linux)
- Red Hat Enterprise Linux configuration VNC multi-user access methods (Linux)
- Android imitation UC browser scroll up and down functions (Programming)
- grep regular expression (Linux)
- Python 2.7 installed on CentOS 6.5 (Linux)
- Ubuntu Server 14.04 installation Web server (Linux + Apache + MySQL + PHP) (Server)
- Oracle Database Restore (Database)
- CentOS replaces update source and Linux kernel compilation summary (Linux)
- SteamOS installation under Ubuntu 14.04 (Linux)
- Linux command execution order control and pipeline (Linux)
- Some security configuration of Linux systems (Linux)
- In addition to wget and curl, what better alternatives (Linux)
- CentOS install expect (Linux)
- Manually compile Hadoop 2.6.0 under Ubuntu 14.04 (Server)
- How to interactively create a Docker container (Server)
- Linux alpine use the command line to access Gmail (Linux)
- Python 3.5 await / async (Programming)
- Bash environment is automatically install and initialize oh-my-zsh & autojump zsh (Linux)
- The ActiveMQ JMS installation and application examples for Linux (Linux)
- Linux crontab command format example (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.