Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ 5 tips to improve your Linux desktop security     - Ubuntu install Geary (Linux)

- Linux host dual LAN transceiver package ARP problem (Linux)

- Linux find command to find files (Linux)

- Linux account related documents Interpretation (Linux)

- jobs command example (Linux)

- Introduces Linux kernel compilation system and compiler installation (Linux)

- Easy to install CentOS 6.6 desktop environment (Linux)

- How to Install Redis server on CentOS 7 (Server)

- The Concept and Semantics of Java Memory Model (Programming)

- PF_RING 6.0.2 compiled and installed on Redhat 6.3 x86_64 (Linux)

- NFS installation process under the CentOS (Linux)

- Repair after installing Ubuntu no boot device error (Linux)

- CentOS7 set boot directly into the command line interface (Linux)

- Repair Maven project developed default Maven Plugin folder (Linux)

- RHEL7 unattended automatic installation DHCP + TFTP + SYSLINUX + TFTP + Kickstart (Linux)

- Linux file system data file deletion problem space is not freed (Database)

- Debian 8 (amd64) installation deployment Memcached management tools MemAdmin (Server)

- PostgreSQL vacuum principle of a function and parameters (Database)

- Three methods easy data encryption on Linux (Linux)

- MySQL and Oracle time zone settings compare (Database)

 
         
  5 tips to improve your Linux desktop security
     
  Add Date : 2018-11-21      
         
         
         
 

1, select whole disk encryption (FDE).

Today, Linux operating system, application server increasingly widespread, and system security issues attendant is facing. A growing number of computer criminals have learned how to hack Linux servers to steal data. If you are running a Linux desktop, then how to protect the security of the system do?

Here are five simple steps to enhance the security of your Linux system.

1. Select the Full Disk Encryption (FDE)

No matter which operating system you are using, we recommend that you encrypt the entire hard disk.

If you are hungry laptop is lost or stolen, with a simple login and password can not protect your data security, a thief can use the USB secret key directly into your Linux system to steal data, without going through password.

By encrypting your hard drive, you can ensure that your data is safe, because if there is no thief will not be able to read what FDE password.

FDE encrypted home folder of your knowledge, you do not have to worry about the temporary files, swap files, or other directory files are accessed in case you do not have consciousness.

In Ubuntu and Fedora and many Linux distributions, all rights Dish encryption is used during the installation. You can choose whether to activate it at the time of installation.

Of course, remember to select a correct password!

2. Update software to keep up

Similarly, no matter what operating system you use, you should keep the operating system applications, such as Web browsers, PDF reader and video player software is up to date.

Most Linux distributions is very easy to achieve.

On Ubuntu, by default, the system will automatically install updates.

kneading can double-check the system settings -- Software Update -- updates.

You want to make sure important security updates option is open.

3. Learn to use Linux firewall

Linux kernel includes a firewall component, called iptables, it gives you a powerful way to manage network traffic, and keep a lot of variety of network attacks.

On Ubuntu you will have also called a simple firewall (UFW) applications, front-end program simplifies the iptables settings.

UFW is disabled by default, but you can do open it at a command prompt:

To learn more about iptables and what it can do, you might try a graphical configuration tool, such as a front-end GUFW or UFW.

On Fedora, you will find FirewallD, which is the default alternative to firewall management tools enable FirewallD called firewall configuration; you can install from the command prompt:

4. Tighten the secure browser

many free extensions can improve your browser, but it also brings security privacy issues, whether you use the Mozilla Firefox browser, Google Chrome or other browsers.

5. Using antivirus software

The reason to mention this last point, because in this way has a lot of controversy.

Some people will tell you, the Linux operating system security anti-virus software is meaningless. In fact, this is a very wrong idea.

Why not? If you pass an infected file is infected to other files, so if you have antivirus software, you can protect your system no longer be attacked. Reduce your risk of being attacked.

     
         
         
         
  More:      
 
- extundelete: the Linux-based open source data recovery tools (Linux)
- Oracle database online redo logs are several methods of recovery of deleted (Database)
- Linux System Getting Started Learning: the local time in between Perl and UNIX timestamp conversion (Linux)
- Figlet use (Linux)
- Debian installation (Linux)
- Windows 8.1 hard drive to install Ubuntu 14.04 dual system reference tutorials and multi-drive Precautions (Linux)
- Linux file system data file deletion problem space is not freed (Database)
- The method of CentOS-7.0. The installation and configuration of Tomcat-7 (Server)
- Python dictionary applications get built-in method (Programming)
- Oracle GoldenGate tutorial Second, configure and use (Database)
- ImportTsv-HBase data import tool (Database)
- Iptables small summary (Linux)
- Redis logging system (Database)
- Teach you how to choose to install CentOS 6.5 installation package (Linux)
- Linux users should be aware that should the 7 ls command unique skills (Linux)
- Linux Network Programming --IP packet format Detailed (Programming)
- Linux / BSD firewall M0n0wall Profile (Linux)
- CentOS Linux build SVN server (Server)
- Ubuntu 14.04 next upgrade to GNOME 3.12 (Linux)
- Use the top command (Linux)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.