Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Nine tips to protect the security of Linux desktop     - Android using shape drawable material production (Programming)

- Oracle database online redo logs are several methods of recovery of deleted (Database)

- Recover Ubuntu 14.04 wakes up from standby in case mouse keyboard appears dead (Linux)

- How x2go set up Remote Desktop on Linux (Linux)

- How to determine whether the Linux server was hacked (Linux)

- Android Custom View step (Programming)

- To install and deploy Apache under the CentOS (Server)

- Oracle 12C truncate table cascade (Database)

- how to quickly find a file on Linux system (Linux)

- How to override the plain text files and directories soft connection in linux (Linux)

- The bulk batch multiple rows of data collect (Database)

- How to install Unbound and DNSCrypt in Archlinux (Server)

- To_teach you three strategies to prevent the LAN IP address theft (Linux)

- Transfer files and permissions from Windows to Linux system by Samba (Linux)

- Installation Mesos + Marathon + Zookeeper under CentOS 7 (Server)

- MySQL remote connection settings (Database)

- The lambda expression Java8 (constructor references) (Programming)

- How to use static, class, abstract method in Python (Programming)

- PXE install CentOS 6.4 (Linux)

- Some MySQL interview questions (Database)

  Nine tips to protect the security of Linux desktop
  Add Date : 2017-08-31      
  Many media and experts believe that the Linux, Linux is more secure than Windows. However, security is even more important today, this security also need to properly configure users, this security does not necessarily have to be through a number of specific security software or technology can achieve. Sometimes, the best way to guarantee security is the kind most easily forgotten things.

Whether you are a Linux just beginners, or an experienced user or administrator, checked against nine measures mentioned below can help you strengthen the security of the Linux desktop.

Locking the screen and logging are important

Many users may have forgotten, Linux desktop is a multi-user environment. Because of this, after a user logs off the desktop, other users can log on. This not only means that other people can use your screen, it means that the user completes the work, should be promptly signed out.

Of course, log out is not the only option. If you are the only user of the system, you can also lock the screen. Lock screen means that the user re-enters into the desktop need to enter a password. Sign it with the distinction that, in the locked screen, the user leaves the computer, its application is still running. After entering the desktop, you can continue the original work.

Hidden files and folders

On Linux systems, files and folders by using. "" And to be hidden. For example, as shown below, the original testfilefolder folder there are two files, we can see with the ls command. But after running the command mv adsl-stop .adsl-stop, which can only see with ls a file. This means you can use mv to hide do not want other users to see documents. Of course, you can use ls -a command to view all files, regardless of whether it is hidden.

Have a good password

Linux user's password as the key to the door just as important. If a user key to this many people, he will have to lock do? Of course, this key is the most easily managed to make people come out, that is hard to guess the user's password. If you are using Ubuntu and other distributions, this password may give users more access. Anyway, be sure to protect the user's password is strong. If you really do not trust their own passwords if appropriate, may wish to use this software with Automated Password Generator, which creates a secure random password good for you.

Do not install file-sharing applications

Many users are sharing some files. If you want to run this function, you should know the risks. Especially if you use this function in the workplace, it will be shared by more than just their own files, but also relates to the company's other users, and will also hand over the entire desktop Illegal other users. Therefore, for safety reasons, do not install file-sharing tools.

Regularly updated

Windows users are used to regularly publish Microsoft operating system and application patches left a "profound" impression. Microsoft released a patch but speed is far faster and Linux. In the Linux world, after the discovery of a security vulnerability in a few hours or a few minutes after posting its patch. KDE and Gnome support updates on the panel. Some people think frequent upgrades too much trouble, but it is recommended that you do not refuse the security updates that released there must be reasons.

Install anti-virus mechanism

Do not feel the possibility of viruses that cause system problems minimal. I suggest you adopt a robust virus defense tools such as ClamAV, so you can protect messages sent from your machine does not contain malicious code, it will not affect other system whereby the corporate network.

SELinux is worth a try

SELinux can be a good lock on the application of access control, although some people think SELinux have unsatisfactory places, such as it may affect system performance, and you might find some other applications to install. However, according to the author's experience, the benefits of SELinux security brought about far more than its negative effects. During the Fedora installation, you will have the chance to enable SELinux.

Create / home is a safer on a separate partition method

The default Linux installation / home directory on the root system among. This may be a good idea, but you need to pay attention, because this is a standard installation, so any one can access your system people will clearly know what the data in place. And, if your machine appears a little problem, then how can your data safe?

Road resolve this problem is that you should be / home is placed on a different hard disk or partition. This is perhaps not what good ideas, but if you are really very concerned about data security, try.

Termination or disable some unnecessary services

A desktop machine you are using, rather than a server. So completely unnecessary run nfs, httpd, ftpd, sshd and some other services. It can be said that the average user should not run these services, they can pose a risk to the general user. Therefore, do not run these services. For example, the method terminates NFS service is # /etc/init.d/nfs stop. You can check the /etc/inetd.conf file to see if all unnecessary services have been canceled. This method is simple but very effective. You may wish to try.
- Oracle can not change the tablespace to backup mode in non-archive mode (Database)
- Installation and operation GAMIT software under Linux operating system (Linux)
- How to publish projects to the Jcenter repository using Gradle in Android Studio (Programming)
- The correct way to open Xcode - Debugging (Programming)
- JavaScript event handling Detailed (Programming)
- Rely on IP chain established Linux firewall (Linux)
- QEMU image file used: qcow2 and raw (Linux)
- How to install Git client in Ubuntu (Linux)
- iOS GCD multithreading simple to use (Programming)
- Linux 6 use UDEV binding shared storage (Linux)
- How to install MySQL on Linux Dock (Database)
- Install minimize RHEL / CentOS 7 things to do (Linux)
- apt-get and apt-cache show command examples (Linux)
- How to use awk command in Linux (Linux)
- Android main thread message system (Handler Looper) (Linux)
- MySQL tmpdir parameter modification (Database)
- JavaScript common functions summary (Programming)
- Linux compiler installation Redis (Database)
- To learn from scratch OpenWrt perfect tutorial (Linux)
- To create a problem by the statement date comparison of the difference between MySQL and Oracle (Database)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.