Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Precautions against hackers Linux environment     - Sniffer Linux Environment (Linux)

- Try the command ip, ifconfig is obsolete under Linux (Linux)

- Linux monitoring tools introduced series --smem (Server)

- N1QL bring SQL-like query NoSQL database experience (Database)

- GEC2440 easiest a kernel compile Linux2.6.30.4 (Programming)

- Three methods easy data encryption on Linux (Linux)

- Linux network security strategy (Linux)

- The compiler installed Kaldi under Ubuntu 12.04 (Linux)

- Ubuntu 14.04 Fixed update information is outdated error (Linux)

- Logging information through the web GUI (LogAnalyzer) (Server)

- Teach you how to ensure password security under the Linux operating system (Linux)

- Distributed Firewall Design on Linux platform (Linux)

- Ubuntu 15.04 installation MATE 1.10 (Linux)

- JBPM6 Installation and Configuration Tutorial (Linux)

- 7 extremely dangerous Linux commands (Linux)

- Five kinds of IO Model under Linux (Programming)

- Cygwin install Python MySQLdb (Linux)

- zBackup: A versatile tool to remove duplicate backup (Linux)

- Java interview questions in nine radio (Programming)

- Why HBase need to build SQL engine layer (Database)

 
         
  Precautions against hackers Linux environment
     
  Add Date : 2018-11-21      
         
       
         
  Linux is a multi-user system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences will be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through the chown 700 / etc / inittab the property to other users can not modify on the line.

2, lilo way if you are using the boot, possibly through linuxconf or directly modify lilo.conf to wait to enter the time when set to 0 or the shortest line at boot time. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
     
         
       
         
  More:      
 
- Linux operating system to solve a serious fault handling (Linux)
- Linux nice program origin of the name (Linux)
- How to set cache valid time in Apache (Server)
- Fast Learning Clojure (Programming)
- Security experience: to see how the experts deal with DDoS attacks (Linux)
- xCAT Installation Kit (Linux)
- How Glances monitoring system on Ubuntu (Linux)
- How to use systemd timer (Linux)
- Oracle 11g Export guide problem not an empty table (Database)
- C ++ Fundamentals study notes (Programming)
- JSON Introduction and Usage Summary (Programming)
- View and modify Linux machine name (Linux)
- Android HTTP request with Get Information (Programming)
- Install Git on CentOS (Linux)
- Linux system package manager (rpm, yum, source packages installation) (Linux)
- Upgrading Oracle 11.2.0.1 to 11.2.0.3 (Database)
- Learn to read the source code of vmstat (Linux)
- HttpClient4 usage upgrade from HttpClient3 (Programming)
- How to Install Cantata MPD 1.3.3 for Ubuntu and Derived Version Users (Linux)
- Ubuntu system safe and caution sudo su command (Linux)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.