Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ CentOS 6.0 system security level     - 4 lvcreate example commonly used commands (Linux)

- Use Tmux and Vim to make IDE (Linux)

- How to configure chroot environment in Ubuntu 14.04 (Linux)

- Forbid screen change the window size when creating a new window under CentOS (Linux)

- CentOS install video converter FFmpeg and cutting tools segmenter (Linux)

- Server Security Analysis attack on Linux (Linux)

- Debian 8 (amd64) installation deployment Memcached management tools MemAdmin (Server)

- How to prevent page five invisible killer (Linux)

- Android HTTP request with Get Information (Programming)

- Getting Started with Linux system to learn: how to check the version of SSH on Linux (Linux)

- Memcached distributed caching (Server)

- Fedora 20 users install the Mate 1.8 desktop (Linux)

- Linux operating system ARP Spoofing Defense (Linux)

- Redhat Close SELinux correct step (Linux)

- VMware 8 installation configuration Win7, CentOS-7 Wizard (Linux)

- Java String and StringBuffer and StringBuilder Comments (Programming)

- Android recyclerview cardview (Programming)

- rpm package specify the installation path (Linux)

- About Samba certification process and permissions (Linux)

- ElasticSearch basic usage and cluster structures (Server)

 
         
  CentOS 6.0 system security level
     
  Add Date : 2018-11-21      
         
         
         
  Windows hosts, whether server or client, the relevant user account and password information may have their own set. How long expired, how often to change your password reminder. So in the great CentOS Linux 6.0 operating system also has such way. Then the following we look at this mode of operation and examples. Of course, this article only mentions one mode of operation, that is, use the chage operate the way, in fact, still there are a lot of ways, as we talk about the future I will use to modify the configuration file in which to achieve the desired effect. /etc/login.defs and / etc / default / useradd CentOS system to improve the security level.

See examples. The following use root for the relevant tests and view the desired effect.

[Root @ localhost ~] # chage

Usage: chage [options] [LOGIN]

Options:

-d, --lastday LAST_DAY set date of last password change to LAST_DAY

-E, --expiredate EXPIRE_DATE set account expiration date to EXPIRE_DATE

-h, --help display this help message and exit

-I, --inactive INACTIVE set password inactive after expiration

to INACTIVE

-l, --list show account aging information

-m, --mindays MIN_DAYS set minimum number of days before password

change to MIN_DAYS

-M, --maxdays MAX_DAYS set maximim number of days before password

change to MAX_DAYS

-W, --warndays WARN_DAYS set expiration warning days to WARN_DAYS

To view the current changes have not been root account information.

[Root @ localhost ~] # chage -l root

Last password change: Jul 30, 2011

Password expires: never

Password inactive: never

Account expires: never

Minimum number of days between password change: 0

Maximum number of days between password change: 99999

Number of days of warning before password expires: 7

[Root @ localhost ~] # chage -m 1 -M 60 -W 5 root

Set the corresponding root information

[Root @ localhost ~] #chage -m 1 -M 60 -W 5 root

See root after the effective date, with the original information corresponding contrast. Significant changes

[Root @ localhost ~] # chage -l root

Last password change: Jul 30, 2011

Password expires: Sep 28, 2011

Password inactive: never

Account expires: never

Minimum number of days between password change: 1

Maximum number of days between password change: 60

Number of days of warning before password expires: 5

See whether the entry into force, and the associated account information

[Root @ localhost home] # passwd -S root

root PS 2011-07-29 1 60 5 -1 (Password set, SHA512 crypt.)
     
         
         
         
  More:      
 
- How to make Linux a non-root user uses less than 1024 ports (Linux)
- Linux systems use logwatch log file monitoring (Linux)
- Git uses a basic tutorial (Linux)
- Get and Post requests Comments (Linux)
- Spacewalk remove packages install the update (Linux)
- Linux linux system security (Linux)
- C ++ in the elimination Wunused (Programming)
- MySQL performance comparison of large amounts of data storage (Database)
- C / C ++ language usage summary of const (Programming)
- Linux rpm command Detailed (Linux)
- linux server security (Linux)
- Linux three ways to set environment variables (Linux)
- Redis 3.0.3 Cluster Setup (Database)
- Sniffer install applications in Linux supplement (Linux)
- Red Hat Enterprise Linux 6.4 Configuring VNC Remote Desktop login access (Linux)
- Remote database using RMAN recovery test (RAC return to single-instance database) (Database)
- SSH automatic disconnection problem solving (Linux)
- Ubuntu: HDF5 error: HDF5 header version does not match with the HDF5 library (Linux)
- Emacs install clojure development environment (Linux)
- Difference LVS three scheduling modes (Server)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.