Home IT Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux platform to prevent hackers to share practical skills     - Oracle background processes daemons (Database)

- How to create a new file system / partitions under Linux terminal (Linux)

- Linux network monitoring strategy (Linux)

- Security: set limits on password (Linux)

- Installing Linux and Windows 10 dual system (Linux)

- Android Launcher3 Application List Modify a transparent background (Linux)

- IBM Data Studio to use ---- window displays all rows (Database)

- Ubuntu 14.04 CodeBlocks configuration manually compile Boost 1.57.0 (Linux)

- RedHat Linux 6.4 installation RTL8188CUS wireless network card driver (Linux)

- How to Debian Linux the default Python version switch to alternative version (Linux)

- Use innobackupex full realization of MySQL hot backup (Database)

- Print Linux system error codes (Linux)

- Android memory optimization of the optimal load Bitmap (Linux)

- Linux firewall to prevent external network attacks (Linux)

- UNIX how to restrict users by IP Telnet (Linux)

- Ubuntu users to install the system indicator SysPeek 0.3 (Linux)

- Java reflection summary (Programming)

- Deployment Kubernetes manage Docker example cluster on Ubuntu (Server)

- Ubuntu install snmp packets Unlinked OID in IPATM-IPMC-MIB: marsMIB (Linux)

- Java logging performance of those things (Programming)

  Linux platform to prevent hackers to share practical skills
  Add Date : 2018-11-21      
  Linux is a multiuser operating system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences would be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through chown700 / etc / inittab the property to other users can not modify on the line.

2. If you are using lilo boot manner, possibly through linuxconf or directly modify the lilo. conf enter the wait time is set to 0 at boot time or shortest line. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
- Ubuntu manually set the DSL broadband connection (Linux)
- WEB-based Android Remote Tools Python implementation (Programming)
- To install Spotify in Ubuntu / Mint (Linux)
- Ubuntu 14.04 + xRDP + Xfce implement Windows Remote Desktop Connection (Linux)
- Linux directory structure (Linux)
- Cobbler batch install Ubuntu / CentOS system (Linux)
- Linux Change ssh port and disable remote root login at (Linux)
- Oracle RMAN backups of the control file backup (Database)
- About Git (Linux)
- Linux (Ubuntu) How iptables port mapping (Server)
- Use HugePages optimize memory performance (Database)
- WordPress blog installation Redis Cache (Server)
- ethtool command Detailed (Linux)
- Linux Getting Started tutorial: GNU C and Vim will fight the C / C ++ IDE semi-automatic (Linux)
- Object-C in the preparation of multi-parameter function parameter is omitted (Programming)
- top command causes the system load increases (Linux)
- CentOS 6.5 dual card configuration, one of the external network, a local area network connection (Linux)
- MySQL multi-master-slave synchronization (Database)
- Ease of use "Explain Shell" script to understand Shell command (Linux)
- LVS + Keepalived the DR mode (Server)
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.