Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ 5 tips to improve your Linux desktop security     - MariaDB 10.1 and MySQL 5.7 in general performance on commodity hardware (Database)

- Keepalived achieve high availability Nginx Reverse Proxy (Server)

- Python Dir find a folder several files (Programming)

- Linux Getting Started tutorial: 3D effects and beautify your desktop (Linux)

- C ++ 11 smart pointers (Programming)

- mydumper installation error process (Database)

- Ubuntu 14.04 build Gitlab (Linux)

- Windows 7 hard disk to install Ubuntu 14.10 (Linux)

- Scope of variables in Object-C (Programming)

- SQL MySQL query table duplicate data (Database)

- Linux using RAID how to use Mdadm Tool Management Software RAID (Linux)

- Linux Creating a new user error Creating mailbox file: File exists (Linux)

- Detailed iptables (Linux)

- C ++ Supplements - References (Lvalue Reference, Rvalue Reference) (Linux)

- JavaScript event handling Detailed (Programming)

- Nginx DHCP TFTP Kickstart set up automatic installation system (Server)

- Java semaphores (Programming)

- Command filter MySQL slow query log (Database)

- Linux development management utility command (Linux)

- Python3 multi-thread download codes (Programming)

  5 tips to improve your Linux desktop security
  Add Date : 2018-11-21      

1, select whole disk encryption (FDE).

Today, Linux operating system, application server increasingly widespread, and system security issues attendant is facing. A growing number of computer criminals have learned how to hack Linux servers to steal data. If you are running a Linux desktop, then how to protect the security of the system do?

Here are five simple steps to enhance the security of your Linux system.

1. Select the Full Disk Encryption (FDE)

No matter which operating system you are using, we recommend that you encrypt the entire hard disk.

If you are hungry laptop is lost or stolen, with a simple login and password can not protect your data security, a thief can use the USB secret key directly into your Linux system to steal data, without going through password.

By encrypting your hard drive, you can ensure that your data is safe, because if there is no thief will not be able to read what FDE password.

FDE encrypted home folder of your knowledge, you do not have to worry about the temporary files, swap files, or other directory files are accessed in case you do not have consciousness.

In Ubuntu and Fedora and many Linux distributions, all rights Dish encryption is used during the installation. You can choose whether to activate it at the time of installation.

Of course, remember to select a correct password!

2. Update software to keep up

Similarly, no matter what operating system you use, you should keep the operating system applications, such as Web browsers, PDF reader and video player software is up to date.

Most Linux distributions is very easy to achieve.

On Ubuntu, by default, the system will automatically install updates.

kneading can double-check the system settings -- Software Update -- updates.

You want to make sure important security updates option is open.

3. Learn to use Linux firewall

Linux kernel includes a firewall component, called iptables, it gives you a powerful way to manage network traffic, and keep a lot of variety of network attacks.

On Ubuntu you will have also called a simple firewall (UFW) applications, front-end program simplifies the iptables settings.

UFW is disabled by default, but you can do open it at a command prompt:

To learn more about iptables and what it can do, you might try a graphical configuration tool, such as a front-end GUFW or UFW.

On Fedora, you will find FirewallD, which is the default alternative to firewall management tools enable FirewallD called firewall configuration; you can install from the command prompt:

4. Tighten the secure browser

many free extensions can improve your browser, but it also brings security privacy issues, whether you use the Mozilla Firefox browser, Google Chrome or other browsers.

5. Using antivirus software

The reason to mention this last point, because in this way has a lot of controversy.

Some people will tell you, the Linux operating system security anti-virus software is meaningless. In fact, this is a very wrong idea.

Why not? If you pass an infected file is infected to other files, so if you have antivirus software, you can protect your system no longer be attacked. Reduce your risk of being attacked.

- Java integrated development environment common set of operations (Linux)
- Advanced permissions Linux file system settings (Linux)
- To configure linux transparent firewall (Linux)
- SQLite database commonly used sentences and visualization tools on MAC MeasSQLlite use (Database)
- Mounting kit under Fedora Linux (Linux)
- Linux user groups, file permissions Detailed (Linux)
- Linux Getting Started tutorial: hard disk partition and to deal with traps (Linux)
- Install Java on RHEL6 (Linux)
- CentOS 7 version how to achieve the power to start the graphical interface (Linux)
- OpenGL Superb Learning Notes - Depth Texture and Shadows (Programming)
- Ubuntu How to install screen recording tool Simple Screen Recorder 0.3.1 (Linux)
- Oracle archive log summary (Database)
- Varnish configuration language VCL and its built-in variables (Server)
- Android Activity launchMode (Programming)
- LVS + Keepalived the DR mode (Server)
- Python in yield (Programming)
- Using IE can also be easily remotely control the computer (Linux)
- Based on a complete solution RMI service to transfer large files (Programming)
- Linux Network Programming - raw socket Example: sending a UDP packet (Programming)
- 32-bit and 64-bit integer in PHP and MySQL range (Database)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.