Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Linux five security TIPS     - Using Java to build micro-services (Server)

- HDFS Distributed File System Resource Manager Developer summary (Server)

- Replace font under Linux (Linux)

- MySQL5.6.12 Waiting for commit lock lead to hang from the library housing problem analysis (Database)

- Static member variable modified (Programming)

- Ubuntu 14.04 set auto sleep time (Linux)

- Linux filtration empty file command summary (Linux)

- Linux protobuf-c (Linux)

- About MongoDB query method according to fuzzy field (Database)

- PHP Performance Analysis and Experiment: Performance Micro Analysis (Programming)

- Let CentOS6 yum upgrade to support more source rpm package (Linux)

- iOS development -Launch Image and Launchscreen (Programming)

- Python data types summary (Programming)

- Open SSH remote access service that allows Android phone Ubuntu 14.04 (Linux)

- Learning C ++ Standard Template Library and data structures (Programming)

- Iscsi package is installed on RHEL 6.3 x86-64 systems (Linux)

- CentOS 5.x install Lua 5.2.3 error (LIBS = -lncurses) (Linux)

- File easier to compare tools under Linux (Linux)

- MySQL display operation control tips (Database)

- Oracle11g build physical standby database (Database)

 
         
  Linux five security TIPS
     
  Add Date : 2018-11-21      
         
         
         
  what did you say? You do not need to take security measures on Linuxbox, because it is Linux ?, Think about it, Linux is inherently require Internet operating system, which of course is the need for security measures. Indeed safer, but no system is 100% safe, and if so, then good, open it now. Here are five important Linux security tips.

1, the keyring to use. For many people, this is a very confusing thing. You log on to the computer, then your computer requests to create a network connection, you have to export your keyring password, there is a temporarily disable this feature solution is to enter an empty password, and then without warning you will want to transfer plaintext ( including passwords) dialog box. This is a bad idea, you might think that something a little out of the way, but put there for a reason, when the password must be transmitted over the network encrypted password.

2, force the user to update the password if you are using a multi-user system (which is also one of the goals of Linux), you should ensure that your users are constantly changing their password, which can chage command. You can pull it detects whether the password has expired. Related Usage of this command, see the man page for details.

3, do not blindly disable SELinux can be as keyring, SELinux is not missed the innocent have been developed. SE blindly Sercurity Enhanced (enhanced security), which provides a mechanism for controlling access to music applications. I have read many versions of "solutions" designed to help people solve the problem of disabling SELinux. In fact, if this can be considered a solution, then it can only lead to more nausea problems. If a program can not run properly, it should be to check the configuration of SELinux policy to meet your needs rather than simply disable it. If you do not want the command line to deal with this problem, it can be called by a polgengui application to achieve this.

4, do not log in as root sounds, there is sufficient reason to think it is not wrong which place? I think no matter how stressed if the root user login system is not excessive. If you need to do some administrative work, then log in as a normal user and then either use the su command to switch to root or use sudo advantage of. If you logged in as root, you can easily bypass the security barrier, and then be able to access the common user logins not visit the systems and subsystems. www.linuxidc.com do not do it. Please use the ordinary user.

5, Quick Setup Security Updates Linux and windows on the approach to the problem of updating the difference is huge. Low frequency window will do a large-scale update, while Linux is a small-scale high update frequency. If you ignore these updates cause some security vulnerability patch is not marked, the end may be very tragic. You have to remember, in fact, is the need to install some updates immediately after the entry into force. When the "Update available" icon appears, do not ignore it. If you are not using a graphical interface of Linux servers, it is best to create a crontab background task to check for updates, or per day (week) manually check for updates. Latest ensure we can guarantee safer.

Do you feel that your Linux system is very safe it? Should be, and the security level of your Linux machine has been promoted by the above five methods to a new level will come up. A word of caution, this can not be a cure-all. Is just the beginning of it, to enhance the security level of the network computer is endless. However, by not a few steps above, you can at least target the "security" of the controversial step closer.
     
         
         
         
  More:      
 
- Linux server startup and logon security settings (Linux)
- Programmer editor Vim (Linux)
- Build your own Git server under Linux (Server)
- Linux operation and maintenance of the automated installation and deployment RHEL7.0 Cobbler (Linux)
- C ++ CBitmap, HBitmap, Bitmap difference and contact (Programming)
- Linux Command Line Art (Linux)
- Postmodern systems programming language (Programming)
- PostgreSQL export data dictionary documents (Database)
- To install file manager Nautilus 3.12.2 under ubuntu (Linux)
- Setting Derby as Linux / Windows running as a service from the start (Server)
- Father of Python: Why Python zero-based index (Programming)
- CKEditor + SWFUpload achieve a more powerful editor (Linux)
- MySQL rollback insert statement causes ibd file grows double (Database)
- CentOS 6.7 compile and install LAMP (Server)
- CentOS7 installation configuration Redis-3.0.0 (Database)
- CentOS 6.6 installation certification system based on the ftp service (Server)
- MySQL simple operation notes under Linux (Database)
- Linux System Getting Started Learning: rename multiple files in Linux (Linux)
- Oracle 11gr2 new APPEND_VALUES tips (Database)
- Linux system commands to view hardware information (Linux)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.