Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ 5 tips to improve your Linux desktop security     - Linux - use chroot command (Linux)

- RT-11SJ run at ambient PDP-11 MACRO-11 assembly (Programming)

- CentOS 5.x install Lua 5.2.3 error (LIBS = -lncurses) (Linux)

- Terminal Linux command prints - echo (Linux)

- Eclipse configuration GTK (Linux)

- Bash command substitution (Programming)

- Android custom controls create the simplest skid menu in the history (Programming)

- Hadoop scheduling availability of workflow platform - Oozie (Server)

- Perl loop (Programming)

- How to customize your Linux desktop: Gnome 3 (Linux)

- Arduino UNO simulation development environment set up and run simulation (Linux)

- How to add any of a Linux distribution beautiful fonts (Linux)

- How to use the Linux kill command to kill the process / program is not responding (Linux)

- Use backup-manager system backup on Linux (Linux)

- Install Rubinius testing Ubuntu 14.04 native threads (Linux)

- Quickly build and install Linux KVM system (Linux)

- shell-like program (Programming)

- Linux find command usage summary (Linux)

- C language macro definition #define Usage (Programming)

- Java transient keyword (Programming)

 
         
  5 tips to improve your Linux desktop security
     
  Add Date : 2018-11-21      
         
         
         
 

1, select whole disk encryption (FDE).

Today, Linux operating system, application server increasingly widespread, and system security issues attendant is facing. A growing number of computer criminals have learned how to hack Linux servers to steal data. If you are running a Linux desktop, then how to protect the security of the system do?

Here are five simple steps to enhance the security of your Linux system.

1. Select the Full Disk Encryption (FDE)

No matter which operating system you are using, we recommend that you encrypt the entire hard disk.

If you are hungry laptop is lost or stolen, with a simple login and password can not protect your data security, a thief can use the USB secret key directly into your Linux system to steal data, without going through password.

By encrypting your hard drive, you can ensure that your data is safe, because if there is no thief will not be able to read what FDE password.

FDE encrypted home folder of your knowledge, you do not have to worry about the temporary files, swap files, or other directory files are accessed in case you do not have consciousness.

In Ubuntu and Fedora and many Linux distributions, all rights Dish encryption is used during the installation. You can choose whether to activate it at the time of installation.

Of course, remember to select a correct password!

2. Update software to keep up

Similarly, no matter what operating system you use, you should keep the operating system applications, such as Web browsers, PDF reader and video player software is up to date.

Most Linux distributions is very easy to achieve.

On Ubuntu, by default, the system will automatically install updates.

kneading can double-check the system settings -- Software Update -- updates.

You want to make sure important security updates option is open.

3. Learn to use Linux firewall

Linux kernel includes a firewall component, called iptables, it gives you a powerful way to manage network traffic, and keep a lot of variety of network attacks.

On Ubuntu you will have also called a simple firewall (UFW) applications, front-end program simplifies the iptables settings.

UFW is disabled by default, but you can do open it at a command prompt:

To learn more about iptables and what it can do, you might try a graphical configuration tool, such as a front-end GUFW or UFW.

On Fedora, you will find FirewallD, which is the default alternative to firewall management tools enable FirewallD called firewall configuration; you can install from the command prompt:

4. Tighten the secure browser

many free extensions can improve your browser, but it also brings security privacy issues, whether you use the Mozilla Firefox browser, Google Chrome or other browsers.

5. Using antivirus software

The reason to mention this last point, because in this way has a lot of controversy.

Some people will tell you, the Linux operating system security anti-virus software is meaningless. In fact, this is a very wrong idea.

Why not? If you pass an infected file is infected to other files, so if you have antivirus software, you can protect your system no longer be attacked. Reduce your risk of being attacked.

     
         
         
         
  More:      
 
- Shell Common Command Summary (Programming)
- 10 useful Linux command Interview Questions and Answers (Linux)
- MariaDB database storage path modify configuration issues (Database)
- Using RAID in Linux: Create a RAID 5 (Linux)
- Arduino UNO simulation development environment set up and run simulation (Linux)
- RHEL 6.4 installed MySQL 5.6.27 (Database)
- JBoss7 configuration - Supports IPv4 and IPv6 dual-stack environment (Server)
- HTTPS and SSH and use the difference between the way: Git User's Manual (Linux)
- MultiWriter: while the ISO image concurrent writes 20 USB Startup Disk (Linux)
- About Linux iptables firewall interview questions and answers (Linux)
- Spring AOP (Programming)
- To install the iNode client on UbuntuKylin 13.10 (Linux)
- Linux Network Programming - raw socket instance: MAC header message analysis (Programming)
- struts2 completely the wrong way to capture 404 (Programming)
- Bash added to the Vi mode indicator (Linux)
- Simple to install Tor browser to Ubuntu 14.04 and Linux Mint 17 (Linux)
- Ubuntu set Swap Space Tutorial (Linux)
- JavaScript basic tools list (Programming)
- Django 1.8 TEMPLATE_DIRS configuration and STATICFILES_DIRS (Server)
- Top 10: HTML5, JavaScript 3D game engine and framework (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.