Home IT Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Precautions against hackers Linux environment     - Linux iptables: basic principles and rules (Linux)

- Java Foundation - implicit conversion vs cast (Programming)

- Let the terminal under Mac OS X as like Linux has displayed a variety of colors (Linux)

- OpenNMS compile under Linux (Server)

- Linux network cut package is not fully defragment (Linux)

- Linux system package manager (rpm, yum, source packages installation) (Linux)

- The hash function under OpenSSL (Linux)

- Storm basic framework for analysis (Programming)

- Based on Google Cloud Storage Mirroring open Maven Central Repository (Server)

- How do I cancel (almost) any operations in Git, (Linux)

- Restrict console access to Linux servers to improve security (Linux)

- ORA-12537: TNS: connection closed error process (Database)

- How to Install Linux kernel 4.0 on Ubuntu / CentOS (Linux)

- How to run in support UDp Docker container JBoss data virtualization GA (Server)

- C ++ 11 smart pointers (Programming)

- Those functions under Linux you do not know the df command (Linux)

- Spring Integration ehcache annotation implement the query cache and cache update or delete instant (Programming)

- Ubuntu 14.04 installed Nvidia CUDA 7.5 and build Python Theano deep learning development environment (Linux)

- Several start-up mode of Tomcat (Server)

- Linux deploy Tutorial (Linux)

  Precautions against hackers Linux environment
  Add Date : 2018-11-21      
  Linux is a multi-user system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences will be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through the chown 700 / etc / inittab the property to other users can not modify on the line.

2, lilo way if you are using the boot, possibly through linuxconf or directly modify lilo.conf to wait to enter the time when set to 0 or the shortest line at boot time. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
- Use SVN to automatically deploy code under Apache (Server)
- Debian users to install FFmpeg 2.2.2 (Linux)
- Category prevent DoS attacks against Linux (Linux)
- Android Service Lifecycle and usage (Programming)
- Forwarding module with Apache reverse proxy server (Server)
- How to Use Nmap security scanner tool on Linux (Linux)
- Keepalived achieve high availability Nginx Reverse Proxy (Server)
- Oracle Database ORA-01555 snapshot too old (Database)
- CentOS7 complete step to install Hadoop2.7 (Server)
- ThinkPad X220 Ubuntu 14.10 installed on fingerprint recognition (Linux)
- Python implementation restart the router (Programming)
- pureftpd basis: Install, configure, implement, anonymous logon (Linux)
- Unable to solve the official version of Android Studio online update problem (Linux)
- Construction CA certificate using OpenSSL command line (Server)
- AIX system file security aspects (Linux)
- Linux security concerns again (Linux)
- Use Docker containers (Linux)
- Git uses a standard process (Linux)
- DataGuard a hardware issue warnings found (Database)
- ARP Linux-related operations (Linux)
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.