Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux system security     - Linux using DenyHosts prevents ssh cracks (Linux)

- VirtualBox snapshots (Linux)

- Let you Fun Ubuntu desktop eleven weapon (Linux)

- Shell script to crawl through AWR SQL Report Problems (Database)

- Linux netstat command to get started (Linux)

- Open container cluster management system architecture and components introduced Kubernetes (Server)

- Linux System Getting Started Tutorial: How to find the maximum memory your system supports (Linux)

- Ambari and Hadoop configuration, management and monitoring of the project Getting (Server)

- Several reasons MySQL garbled (Database)

- CentOS6.x and Windows XP and Windows Server 2003 Open IPv6 related matters (Linux)

- System Security: Build Linux with LIDS steel castle (Linux)

- 20 Top Linux commands (Linux)

- Java gets the current system time System.currentTimeMillis () (Programming)

- Install Web-based monitoring tool: Linux-Dash (Server)

- Installation under Linux to deploy Java (Linux)

- Installation Flow N Play- interface stylized video player on Ubuntu (Linux)

- Linux process management related content (Linux)

- How to use the on-screen keyboard in Linux (Linux)

- Compile and install Ubuntu Linux 4.0.5 kernel, network and fix vmware kernel module compilation error (Linux)

- pdf.js Tutorial (Linux)

  Linux system security
  Add Date : 2018-11-21      
  In the operating system, we feel a lot of loopholes in Windows, and Linux seems safer. When people are increasingly interested in looking for Microsoft operating systems and software vulnerabilities, making Windows becoming more and more known as hackers attacked goals, but often overlooked in the world's second most number of people using the Linux operating system.

    In fact, in 1996 it appeared the first virus Staog Linux platform. This virus is said to be called by the Australian hacker a VLAD organization written in assembly language (the organization on the virus left a quite brilliant glorious book imprint, Windows 95 under Boza is the first virus program work of the organization) . It only infected binary files, trying to get root privileges in three ways, but it still only be regarded as a demonstration of samples of the virus, meaning it exists only to prove that Linux fans: Linux is not invincible, it also exists the risk of virus attack, just as perfect Linux operating system design makes this a relatively low risk factor only.

    The second appears on the Linux operating system, the virus is Bliss virus, it is an experimental product, is in the experiment was accidentally released the virus, but it itself has immunity, the system does not have too much risk.

    Until the emergence of Ramen, but only in the Linux operating system airtight security re-doubt. Ramen virus can spread automatically, without human intervention, and in 1988 the popularity of the Morris worm is very similar. It only infected with Red Hat 6.2 and using anonymous FTP service server version 7.0, through two common vulnerabilities RPC.statd and wu-FTP infected system. And more popular in the Windows worm virus, which attacks the signs are not infected files, but network bandwidth consumption when scanning, so that the normal resource request can not reach the service.

    In fact, the use of security exploits computer viruses also help Linux Ramen NM timely repair loopholes in time because it attacks also exposed the vulnerability exists.

    Yet another use of shell scripting language virus, we can find a lot of articles about the virus analytical articles on the web, but mostly in rendering its severity. Linux file systems have a lot in .sh script file, a very simple shell virus can infect the system in all script files.

    The most important thing is, it's very easy to write, shell virus dozens of lines is a very simple matter for those eager to become famous on the web is not academic but fine "hacker" is. In other words, easy to be with evil people use the virus shell is the most powerful place.

   Many articles have mentioned, remove Linux innate design is strong enough, the early use of the Linux operating system, mostly professionals in security conscious experience of heritage is also doing very well, which makes Linux has made a good cultural conditions to protect yourself. The author believes that the young, is also an important reason for Linux from irresponsible hackers. But as Linux users became "cohabitation" and the industry will continue to give it a high rating, new security threats followed.

    This allows security start Linux is more concerned about the human virus is called Linux.Lion, is what we often see in the domestic Linux Forum "Lion" worm. If the first under Linux Ramen worm in the history of the virus is not enough to shine, now Lion virus crispness realize this "desire."

    Lion Ramen virus viruses do not infect Windows operating system, but it has a particularly dangerous feature is the ability to password and configuration files are infected computer to send a mail China.com by EMAIL. And it is more difficult to deal with than the Ramen virus is in place, the hackers had the password and configuration files in the system when the attack without the use of security vulnerabilities that could allow an attacker more difficult to prevent.

    Compared with the Windows platform rampant viruses, said several virus really can not be regarded as a heinous crime, all they do are just trying to challenge the myth of Linux security, but in a warning to those who are convinced that Linux is absolutely secure user: Linux is not secure.

    Of course, the presence of the virus in the Linux operating system far more than these, Unux.Svat, BoxPoison other viruses have also given varying degrees of damage to the Linux users and Linux users with a significant increase, more and more Linux system connected to on the Internet, which greatly increases the possibility of the system being infringed. It is foreseeable that there will be more viruses on Linux. Protection of Linux, also requested an early start.
- ORA-28000 the account is locked fault simulation (Database)
- Linux with Windows Explorer as a security system (Linux)
- How to Set Free SSH password on CentOS / RHEL (Linux)
- Easy to install Ubuntu 15.04 and Ubuntu 15.04 GNOME on Wayland trial (Linux)
- CentOS7 install JAVA notes (Linux)
- Linux Network Programming - non-blocking program (Programming)
- A list of the basics of Python, Ganso, Dictionary (Programming)
- Ubuntu the ARP (arptables) (Linux)
- JQuery implements the same content merge cells (Programming)
- Linux System Getting Started Learning: Repair (Linux)
- Install MATE desktop environment adjustment tools Mate Tweak 3.3.6 (Linux)
- Memcache explain in detail (Server)
- Windows7 / 8 / 8.1 hard drive to install Ubuntu 14.04 dual system (Linux)
- Shuffle Process Arrangement in MapReduce (Server)
- Using the Linux VNC service (Server)
- Oracle partition table data migration, process management automation (Database)
- Linux bash: scp: command not found the problem (Linux)
- Binding unofficial Google Drive and Ubuntu 14.04 LTS (Linux)
- numpy and SciPy installation under Python for scientific computing package (Linux)
- OpenNMS separate database (Server)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.