Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ 5 tips to improve your Linux desktop security     - CentOS 6.7 compile and install LAMP (Server)

- Graphical development environment to build Android under Ubuntu 11.04 (Linux)

- Shell generated using automated configuration script Orabbix (Database)

- Create a project using Android Studio LinearLayout (Programming)

- Netapp storage routine inspections and information gathering (Linux)

- Linux beginners should know 12 commands (Linux)

- 11.2.04 Oracle RAC directory crfclust.bdb file is too large, Bug 20186278 (Database)

- Zabbix installation and configuration process (Server)

- How to install or upgrade to the Linux kernel in Ubuntu 4.2 (Linux)

- JavaScript: understanding regular expressions (Programming)

- CentOS install Java 1.8 (Linux)

- Fragment Android developers learning to resolve (Programming)

- Use PDFBox processing PDF documents (Linux)

- JavaScript is implemented without new keywords constructor (Programming)

- Close common port to protect server security (Linux)

- Hibernate Performance Optimization of reusing SessionFactory (Programming)

- Ubuntu install perfectly handsome terminal Guake 0.8.1 (Linux)

- Vim simple configuration (Linux)

- C language programming entry - Common operators (Programming)

- How to make GRub instead of the default Ubuntu software center (Linux)

  5 tips to improve your Linux desktop security
  Add Date : 2018-11-21      

1, select whole disk encryption (FDE).

Today, Linux operating system, application server increasingly widespread, and system security issues attendant is facing. A growing number of computer criminals have learned how to hack Linux servers to steal data. If you are running a Linux desktop, then how to protect the security of the system do?

Here are five simple steps to enhance the security of your Linux system.

1. Select the Full Disk Encryption (FDE)

No matter which operating system you are using, we recommend that you encrypt the entire hard disk.

If you are hungry laptop is lost or stolen, with a simple login and password can not protect your data security, a thief can use the USB secret key directly into your Linux system to steal data, without going through password.

By encrypting your hard drive, you can ensure that your data is safe, because if there is no thief will not be able to read what FDE password.

FDE encrypted home folder of your knowledge, you do not have to worry about the temporary files, swap files, or other directory files are accessed in case you do not have consciousness.

In Ubuntu and Fedora and many Linux distributions, all rights Dish encryption is used during the installation. You can choose whether to activate it at the time of installation.

Of course, remember to select a correct password!

2. Update software to keep up

Similarly, no matter what operating system you use, you should keep the operating system applications, such as Web browsers, PDF reader and video player software is up to date.

Most Linux distributions is very easy to achieve.

On Ubuntu, by default, the system will automatically install updates.

kneading can double-check the system settings -- Software Update -- updates.

You want to make sure important security updates option is open.

3. Learn to use Linux firewall

Linux kernel includes a firewall component, called iptables, it gives you a powerful way to manage network traffic, and keep a lot of variety of network attacks.

On Ubuntu you will have also called a simple firewall (UFW) applications, front-end program simplifies the iptables settings.

UFW is disabled by default, but you can do open it at a command prompt:

To learn more about iptables and what it can do, you might try a graphical configuration tool, such as a front-end GUFW or UFW.

On Fedora, you will find FirewallD, which is the default alternative to firewall management tools enable FirewallD called firewall configuration; you can install from the command prompt:

4. Tighten the secure browser

many free extensions can improve your browser, but it also brings security privacy issues, whether you use the Mozilla Firefox browser, Google Chrome or other browsers.

5. Using antivirus software

The reason to mention this last point, because in this way has a lot of controversy.

Some people will tell you, the Linux operating system security anti-virus software is meaningless. In fact, this is a very wrong idea.

Why not? If you pass an infected file is infected to other files, so if you have antivirus software, you can protect your system no longer be attacked. Reduce your risk of being attacked.

- Linux file system (inode and block) (Linux)
- What Java 8 fastest garbage collector (Programming)
- How to modify the Sublime in Tab four spaces (Linux)
- Ubuntu 14.10 / 14.04 how to install Quick Start tool Mutate 2.2 (Linux)
- Python MySQL database connection (Database)
- Linux more efficient than select a model epoll (Linux)
- Android LayoutInflater source parsing (Programming)
- Oracle11g CRS-0184 Problem Solving (Database)
- Oracle Database ORA-01555 snapshot too old (Database)
- Three binary tree traversal (recursive, non-recursive traversal and Morris) (Programming)
- Setting Hibernate connection MySQL database connection pool coding (Database)
- Tmux Crash Course: Tips and adjustment (Linux)
- Linux disk partition batch format mount script (Linux)
- Solaris 11 forget the root password (Linux)
- Management Linux Container with Docker in Ubuntu (Linux)
- Unsafe reboot start (Linux)
- Oracle GoldenGate Installation and Configuration Tutorial Introduction (Database)
- Oracle 11g RMAN cross-platform transfer table space (Database)
- MySQL replication master and slave structure built (Database)
- Stucts2 values on the page and how the attribute values corresponding to the Action (Programming)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.