Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux server security settings to close unused ports     - Virtualbox virtual machine can not copy CentOS Network (Linux)

- CentOS modify yum update source (Linux)

- Linux 64-bit porting (Programming)

- Ubuntu / openSUSE users to install Veusz 1.21.1 (Linux)

- Household use Linux Security (Linux)

- Oracle 11g on Linux system boot from the startup settings (Database)

- How to install Kernel 4.0.2 on CentOS 7 (Linux)

- Linux system security settings after installation (Linux)

- Share Java-based multithreading file case (Programming)

- Chkconfig set boot start under Linux (Linux)

- Spring + Log4j + ActiveMQ remote logging - Analysis of combat (Server)

- Ubuntu cut screen method (Linux)

- Two classic macro definition under Linux (Linux)

- Android Studio Installation and Configuration Guide tutorial (Linux)

- IntelliJ IDEA common list of shortcuts (Linux)

- How to install Unbound and DNSCrypt in Archlinux (Server)

- Mac OS X 10.9 build Nginx + MySQL + php-fpm environment (Server)

- To install Ganglia configuration of experience under CentOS 5.5 (Linux)

- Binary tree traversal algorithm summary (recursive and non-recursive) (Programming)

- Oracle TDE transparent data encryption (Database)

  Linux server security settings to close unused ports
  Add Date : 2017-04-13      
  Now many small users for business development, and constantly update or upgrade the network, resulting in a large difference in their own user environment, uneven across the network platform, the server they use a Linux system, and PC side using Windows systems. So in enterprise applications often Linux / Unix and Windows operating systems co-exist the formation of heterogeneous networks. SMEs lack of experienced Linux administrators and network security products procurement funds, so for lack of a comprehensive network security is often a lack of consideration. It will secure server security and network devices to address enterprise and other troubles.

Close unused ports

Any network connection through an open application ports to achieve. If we as little as possible to open ports to make network attacks become a source of water, thereby greatly reducing the attackers chance of success.

First, check your inetd.conf file. inetd tarried on certain ports, ready for you to provide the necessary services. If someone developed a special inetd daemon, where there is a security risk. You should comment out those who never used the service in the inetd.conf file (eg: echo, gopher, rsh, rlogin, rexec, ntalk, finger, etc.). Note unless absolutely necessary, you must comment out the rsh, rlogin and rexec, and telnet suggest you use ssh instead of more secure, then kill lnetd process. Such monitoring is no longer inetd daemon on your machine, so as to prevent some people use it to steal your application port. Your best is to download a port scanner to scan your system, you do not know if there are open ports, immediately find the process is using it to judge whether or not to close them.
- How to extend / remove swap partitions (Linux)
- Command line tool Tmux (Linux)
- CentOS 6.5 / Linux restart network card being given Determining if ip address x.x.x.x is already in use (Linux)
- MySQL combination Git achieve differential backups can be used in the production environment (Database)
- 20 Advanced Java interview questions summary (Programming)
- Log4cplus logging facility configuration, installation, testing (Linux)
- Java annotations entry automatically generates SQL statements (Programming)
- NAT and firewall under Linux (Linux)
- [JavaScript] catch (ex) statements of ex (Programming)
- Struts2 configure a static resource files without Struts processing (regular match) (Programming)
- Oracle 11g users to create, authorize and import dmp file (Database)
- CentOS-based Kickstart automated installation practice (Linux)
- CentOS 7 Test Marathon start Docker container (Server)
- MySQL error: ERROR 1175: You are using safe update mode solution (Database)
- Git bulk delete remote tag (Linux)
- To share some very useful Vim command (Linux)
- To achieve a two-way static NAT stateless available modules on Linux (Linux)
- Raspberry Pi 2 to install the latest version of the FPC and Lazarus 1.5 (Linux)
- Virtual Judge environment to build and configure under Ubuntu (Server)
- Oracle table Access Control (Database)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.