Home IT Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux platform to prevent hackers to share practical skills     - Basic data types JavaScript type system and the type of packaging (Programming)

- HAProxy Windows version of the compiler and its application in the CORS (Server)

- Killall five options you might not know (Linux)

- About ORA-02391 solution (Database)

- Apache POI Excel Document Processing (Linux)

- Dalvik heap memory management and recycling (Linux)

- Qt shared memory interprocess communication (Programming)

- How to configure a server in a MySQL Cluster (Database)

- Configuring Sublime Text Python runtime environment 2 (Linux)

- Ubuntu 14.10 install KDE Plasma 5.2 (Linux)

- Summary Linux operating system some tips to prevent attacks (Linux)

- RabbitMQ tutorial examples: the Hello RabbitMQ World Java realization (Linux)

- SQLite database commonly used sentences and visualization tools on MAC MeasSQLlite use (Database)

- ELKstack log analysis platform (Server)

- to install the deployment of LVS under CentOS 7.0 (Server)

- MongoDB slice simple example (Database)

- Java Concurrency - multiple threads of HelloWorld (Programming)

- How to upgrade Docker 1.6 on Fedora / CentOS (Server)

- To_explore Linux system boot process (Linux)

- Use SocketServer write a sockets program (Programming)

  Linux platform to prevent hackers to share practical skills
  Add Date : 2018-11-21      
  Linux is a multiuser operating system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences would be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through chown700 / etc / inittab the property to other users can not modify on the line.

2. If you are using lilo boot manner, possibly through linuxconf or directly modify the lilo. conf enter the wait time is set to 0 at boot time or shortest line. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
- Use LKM change the default linux security level (Linux)
- Linux shell script under the use of randomly generated passwords (Programming)
- CentOS6.3 build a Python 3.3 environment to access Oracle 11gR2 (Database)
- CentOS 6.6 installation certification system based on the ftp service (Server)
- How to determine whether the Linux server was hacked (Linux)
- Java how to achieve bubble sort the problem Arraylist (Programming)
- Eclipse 3.7.2 can not start solving under Ubuntu 14.04 (Linux)
- Spring AOP (Programming)
- MultiWriter: while the ISO image concurrent writes 20 USB Startup Disk (Linux)
- Basic Operation Linux files and directories (Linux)
- See Linux kernel, CPU, memory, and various versions of the command module and means (Linux)
- Firewall types and instructions (Linux)
- Observation network performance tools for Linux (Linux)
- Ubuntu 14.04 Boot Repair (Linux)
- How to create a remote (Linux)
- Raspberry Pi configuration wireless hotspot (Linux)
- How to contribute code to the GNU Project (Linux)
- Linux modify the system time (Linux)
- SendMail version of Java implementation with attachments (Programming)
- Linux system boot process ARM platforms (Linux)
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.