Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux itself disguised illusion strengthen security     - mysql_config_editor encryption and decryption of the new features of MySQL realization (Database)

- NAT and firewall under Linux (Linux)

- Error code: 2013 Lost connection to MySQL server during query (Database)

- Help you enhance Python programming languages 27 (Programming)

- Spring-depth understanding of the various annotations (Programming)

- Linux unpack the tar file to a different directory (Linux)

- AWK principles and commands and file input (Linux)

- Chkconfig set boot start under Linux (Linux)

- How nodeclub constructed Docker image (Server)

- To compile install and test Swift under Linux (Linux)

- Linux kernel netpoll framework netconsole (Linux)

- How to implement large-scale distributed Yahoo depth study on the Hadoop cluster (Server)

- Ubuntu prompt / lack of boot space solutions (Linux)

- Hyper-V virtual hard disk how to copy files to and attached to the virtual machine (Linux)

- Oracle 11g RMAN cross-platform transfer table space (Database)

- Python extension module Ganglia 3.1.x (Linux)

- Customize own small private Linux system (Linux)

- Oracle 11G R2 DataGuard structures (Database)

- Installation of JDK and Tomcat under Linux (CentOS) (Linux)

- Through the source code to install MySQL 5.6.26 under CentOS6 (Database)

  Linux itself disguised illusion strengthen security
  Add Date : 2018-11-21      
  Through camouflage Linux system, set the system to hackers false, you can increase the difficulty of hacking the system analysis, to lure them astray, so as to further improve the security of computer systems. The following Red Hat Linux as an example, some of the commonly used methods Linux system camouflage for several common ways hackers.

For HTTP service

By analyzing the type of Web server, generally we can infer the type of operating system, for example, Windows uses IIS to provide HTTP services, and Linux, the most common is Apache.

The default Apache configuration where there is no information protection mechanism, and allow directory browsing. Browse through the directory, you can usually get a similar "Apache / 1.3.27 Server at apache.linuxforum.net Port 80" or "Apache / 2.0.49 (Unix) PHP / 4.3.8" information.

By modifying the configuration file ServerTokens parameters Apache related information can be hidden. However, Apache Red Hat Linux running a compiled program, prompt information is compiled in a program to hide this information need to modify the Apache source code, then recompile the installer to achieve the prompt replacement of the contents inside.

In Apache 2.0.50, for example, edit ap_release.h file, modify the "#define AP_SERVER_BASEPRODUCT \ Apache \" to "#define AP_SERVER_BASEPRODUCT \ Microsoft-IIS / 5.0 \". Edit os / unix / os.h file, modify the "#define PLATFORM \ Unix \" to "#define PLATFORM \ Win32 \". After modification, recompile, install Apache.

Apache After installation is complete, modify the httpd.conf configuration file, "ServerTokens Full" to "ServerTokens Prod"; the "ServerSignature On" to "ServerSignature Off", then save and exit. After restarting Apache, scan tool, findings suggest that information has been shown in the operating system for Windows.

For the FTP service

Through FTP service, you can speculate the type of operating system, for example, the FTP service under Windows mostly Serv-U, and Linux, commonly used vsftpd, proftpd and pureftpd software.

In proftpd, for example, modify the configuration file proftpd.conf, add the following:

ServerIdent on \ Serv-U FTP Server v5.0 for WinSock ready ... \

Save and exit, restart the proftpd service, log on to modify the message FTP server for testing:

C: \\ ftp

Connected to

220 Serv-U FTP Server v5.0 for WinSock ready ...

User (

331 Password required for (none).


530 Login incorrect.

Login failed.

ftp quit

221 Goodbye.

Thus the surface, the server is a running Serv-U of Windows up.
- linux remote control software (Linux)
- Ubuntu U disk do not have write privileges can only read but not write (Linux)
- Ora-00600 [fast hot Atkins soft _ that _ Oh, of course not _less_ profile] (Database)
- Linux Getting Started tutorial: Experience VirtualBox Virtual Machine chapter (Linux)
- Mysql binlog resolve the garbage problem decryption (Database)
- Infinispan 8 new Redis cache storage implementation (Linux)
- Hunk / Hadoop: Performance Best Practices (Server)
- Oracle 11g maintenance partitions (Seven) - Modifying Real Attributes of Partitions (Database)
- Revised OpenJDK Java Memory Model (Programming)
- Linux user opens a number of adjustment processes (Linux)
- Installation Yarock 1.1.4 Music Player in Ubuntu (Linux)
- PostgreSQL Source Customization: Online global read only (Database)
- CentOS 6.x systems installation + NIC driver installation (Realtek PCIe GBE Family Controller for Linux) (Linux)
- Git you do not know about some of the things (Linux)
- How to clear the DNS query cache under Linux / Unix / Mac (Linux)
- Golang environment configuration recommendations (Linux)
- Docker ecosystem security is gradually maturing (Server)
- Ubuntu 14.10 / 14.04 how to install Quick Start tool Mutate 2.2 (Linux)
- Nginx load balancing configuration (TCP proxy) (Server)
- Linux 6 install Oracle 11g (64bit) (Database)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.