Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Nine tips to protect the security of Linux desktop     - Migrate Oracle database files to ASM (Database)

- Xshell key authentication mechanism using a remote login Linux (Linux)

- The Linux disguised as windows to make the system more secure (Linux)

- Linux check disk parameters trapping lack amendments (Linux)

- Storm how to ensure that at least once semantics (Programming)

- Analysis of memory mapping process in Linux x86-64 mode (Linux)

- Nginx log cutting and MySQL script regular backup script (Server)

- Setting CentOS firewall open port (Linux)

- SA weak password security system of the security risks posed (Linux)

- Based on OpenSSL for HTTPS service configuration (Server)

- Novice Advanced Ubuntu7.10 configured IP address (Linux)

- Install Xshell on Mac OS X (Linux)

- Linux use glibc2 library and crypt () function to generate the user password (Programming)

- Why is better than Git SVN (Linux)

- Linux Powerful command Awk Introduction (Linux)

- Enterprise Hadoop cluster architecture - Hadoop installation (Server)

- Using iptables achieve NAT (Linux)

- Linux operating tips: Can not open file for writing or operation not permitted solution (Linux)

- MySQL how to export files with the date format (Database)

- Usage logs Python library (Programming)

  Nine tips to protect the security of Linux desktop
  Add Date : 2017-08-31      
  Many media and experts believe that the Linux, Linux is more secure than Windows. However, security is even more important today, this security also need to properly configure users, this security does not necessarily have to be through a number of specific security software or technology can achieve. Sometimes, the best way to guarantee security is the kind most easily forgotten things.

Whether you are a Linux just beginners, or an experienced user or administrator, checked against nine measures mentioned below can help you strengthen the security of the Linux desktop.

Locking the screen and logging are important

Many users may have forgotten, Linux desktop is a multi-user environment. Because of this, after a user logs off the desktop, other users can log on. This not only means that other people can use your screen, it means that the user completes the work, should be promptly signed out.

Of course, log out is not the only option. If you are the only user of the system, you can also lock the screen. Lock screen means that the user re-enters into the desktop need to enter a password. Sign it with the distinction that, in the locked screen, the user leaves the computer, its application is still running. After entering the desktop, you can continue the original work.

Hidden files and folders

On Linux systems, files and folders by using. "" And to be hidden. For example, as shown below, the original testfilefolder folder there are two files, we can see with the ls command. But after running the command mv adsl-stop .adsl-stop, which can only see with ls a file. This means you can use mv to hide do not want other users to see documents. Of course, you can use ls -a command to view all files, regardless of whether it is hidden.

Have a good password

Linux user's password as the key to the door just as important. If a user key to this many people, he will have to lock do? Of course, this key is the most easily managed to make people come out, that is hard to guess the user's password. If you are using Ubuntu and other distributions, this password may give users more access. Anyway, be sure to protect the user's password is strong. If you really do not trust their own passwords if appropriate, may wish to use this software with Automated Password Generator, which creates a secure random password good for you.

Do not install file-sharing applications

Many users are sharing some files. If you want to run this function, you should know the risks. Especially if you use this function in the workplace, it will be shared by more than just their own files, but also relates to the company's other users, and will also hand over the entire desktop Illegal other users. Therefore, for safety reasons, do not install file-sharing tools.

Regularly updated

Windows users are used to regularly publish Microsoft operating system and application patches left a "profound" impression. Microsoft released a patch but speed is far faster and Linux. In the Linux world, after the discovery of a security vulnerability in a few hours or a few minutes after posting its patch. KDE and Gnome support updates on the panel. Some people think frequent upgrades too much trouble, but it is recommended that you do not refuse the security updates that released there must be reasons.

Install anti-virus mechanism

Do not feel the possibility of viruses that cause system problems minimal. I suggest you adopt a robust virus defense tools such as ClamAV, so you can protect messages sent from your machine does not contain malicious code, it will not affect other system whereby the corporate network.

SELinux is worth a try

SELinux can be a good lock on the application of access control, although some people think SELinux have unsatisfactory places, such as it may affect system performance, and you might find some other applications to install. However, according to the author's experience, the benefits of SELinux security brought about far more than its negative effects. During the Fedora installation, you will have the chance to enable SELinux.

Create / home is a safer on a separate partition method

The default Linux installation / home directory on the root system among. This may be a good idea, but you need to pay attention, because this is a standard installation, so any one can access your system people will clearly know what the data in place. And, if your machine appears a little problem, then how can your data safe?

Road resolve this problem is that you should be / home is placed on a different hard disk or partition. This is perhaps not what good ideas, but if you are really very concerned about data security, try.

Termination or disable some unnecessary services

A desktop machine you are using, rather than a server. So completely unnecessary run nfs, httpd, ftpd, sshd and some other services. It can be said that the average user should not run these services, they can pose a risk to the general user. Therefore, do not run these services. For example, the method terminates NFS service is # /etc/init.d/nfs stop. You can check the /etc/inetd.conf file to see if all unnecessary services have been canceled. This method is simple but very effective. You may wish to try.
- To disable the function by pressing Ctrl-Alt-Del to restart the system in RHEL / CentOS 5/6 (Linux)
- Use apt-p2p up a local Debian package cache (Server)
- Alien Magic: RPM and DEB Mutual Convert (Linux)
- Red Hat Enterprise Linux configuration VNC multi-user access methods (Linux)
- Linux top command to get started (Linux)
- Linux five security TIPS (Linux)
- 10046 trace only open for a particular SQL statement (Database)
- Infinispan 8 new Redis cache storage implementation (Linux)
- Linux kernel source code analysis (Linux)
- J2EE Example of Filter (Programming)
- Android Studio 1.0.2 set the memory size (Linux)
- Forbid screen change the window size when creating a new window under CentOS (Linux)
- Sorting algorithm of dichotomy (binary) insertion sort algorithm (Programming)
- Use top to monitor the remote server (Server)
- EXP-00091: Exporting questionable statistics Processing Method (Database)
- xCAT install and update software (Linux)
- iOS in Singleton (Programming)
- C ++ runtime environment built on CentOS 6.6 and Oracle database connection (Database)
- Installation and configuration under Linux SVN server - Backup - Recovery - Scheduled Tasks (Server)
- Iscsi package is installed on RHEL 6.3 x86-64 systems (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.