Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Precautions against hackers Linux environment     - GitLab Installation Guide -Ubuntu 14.04 LTS (Server)

- Linux - Common process the command (Linux)

- C # / iOS / Android Universal Encryption and decryption (Programming)

- Dell R710 server disk recovery database one case (record) (Server)

- Linux reserves the rest of the file to delete several (Linux)

- Ubuntu 14.04 Boot Repair (Linux)

- Mount NFS network file system (Linux)

- Linux cron job (crontab) Examples (Linux)

- Install Jetty on CentOS / RHEL 6.X (Server)

- JDK comes with tools JPS (Linux)

- Android Action Compendium (Programming)

- Compare several ways to transfer files between Linux hosts (Linux)

- Linux startup and logon security settings (Linux)

- EXP-00091 Error resolved (Database)

- How to make Linux a non-root user uses less than 1024 ports (Linux)

- Help you enhance Python programming languages 27 (Programming)

- Linux shell in back quotes (`) Application (Linux)

- Ubuntu 12.04 kernel configuration automatically restart and crash dump (Linux)

- Android development, may cause a memory leak problem (Programming)

- Based Corosync + Pacemaker + DRBD + LNMP Web server to achieve high availability cluster (Server)

 
         
  Precautions against hackers Linux environment
     
  Add Date : 2018-11-21      
         
       
         
  Linux is a multi-user system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences will be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through the chown 700 / etc / inittab the property to other users can not modify on the line.

2, lilo way if you are using the boot, possibly through linuxconf or directly modify lilo.conf to wait to enter the time when set to 0 or the shortest line at boot time. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
     
         
       
         
  More:      
 
- PostgreSQL-- run Supervisord on Docker in Ubuntu (Database)
- Oracle online redefinition (Database)
- How to implement large-scale distributed Yahoo depth study on the Hadoop cluster (Server)
- Ora-14450: attempt to access ah transactional temptable already in use (Database)
- Kubuntu 14.04 desktop to the user how to upgrade KDE 4.13.2 (Linux)
- How to install and configure a VNC server on CentOS 7.0 (Server)
- Linux System Tutorial: Fix ImportError: No module named wxversion error (Linux)
- Remove old kernel on Ubuntu (Linux)
- Encrypted with GnuPG signature to verify the authenticity and integrity of downloaded file (Linux)
- To learn from scratch OpenWrt perfect tutorial (Linux)
- JavaScript function closures Quick Start (Programming)
- How to cool down your Ubuntu system (Linux)
- Java memory analysis tool uses detailed MAT (Programming)
- Debian 7.7 Installation and Configuration (Linux)
- View processes and threads under Linux (Linux)
- Java-- get the reflection object information (Programming)
- The several technical presentation Raid under Linux (Linux)
- Use Tmux and Vim to make IDE (Linux)
- How to Start a Linux application running in the background using the terminal mode (Linux)
- Iptables Instructions (Linux)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.