Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Precautions against hackers Linux environment     - Tree Traversals Again (Programming)

- Common DDOS attacks (Linux)

- Heartbeat cluster components Overview (Server)

- The user of fedora is not in the sudoers file method to solve (Linux)

- Oracle row and column switch to turn columns (Database)

- Install DB2 V10 and Data Studio V3 under Linux (Ubuntu) environment (Database)

- Linux uses a screen recording under RecordMyDesktop (Linux)

- ORA-12537: TNS: connection closed error process (Database)

- Ubuntu 14.04 compile, install, configure, the latest development version GoldenDict (Linux)

- Video editing captions under Linux (Linux)

- Oracle 11g RAC manually playing GI PSU patch (11.2.0.4.8) (Database)

- Standard and IO redirection (Linux)

- GNU / Linux enable Intel Rapid Start (Linux)

- Unity Greeter Badges: the lost session icon back to the login screen Ubuntu (Linux)

- Java open source monitoring platform Zorka basic use (Linux)

- swap space is insufficient cause OOM kill MySQL Case (Database)

- CentOS 7.0 Enable iptables firewall (Linux)

- Linux system file directory structure Introduction (Linux)

- Linux Open coredump (Linux)

- Oracle Migration partition table (Database)

 
         
  Precautions against hackers Linux environment
     
  Add Date : 2018-11-21      
         
       
         
  Linux is a multi-user system, once people get to your root user, he can do whatever they like on your system, because the single-user on the system have full control permissions, if improper operation or others to enter, then the consequences will be disastrous, how to prevent the entry of single users, and there are several aspects of attention.

1, on the / etc / inittab file for protection, if the id: 3: initdefault in 3 to become one, you can boot directly into each single-user mode. Of / etc / inittab file to root, enter through the chown 700 / etc / inittab the property to other users can not modify on the line.

2, lilo way if you are using the boot, possibly through linuxconf or directly modify lilo.conf to wait to enter the time when set to 0 or the shortest line at boot time. In this case, if into single user mode, you can use a floppy disk to boot.

3, if you use the GRUB boot mode, the simplest way is to use GRUB password protection on startup option.

4, in order to prevent others from remotely destroyed the system restart, in addition to the ROOT password and files etc directory / effective management but also should set the CMOS password, so that even if the system into single-user mode, and You can not directly start the computer to operate.
     
         
       
         
  More:      
 
- Linux System Getting Started Learning: Using yum to download the RPM package without installing (Linux)
- Java application server WildFly (Server)
- True and false in Perl (Programming)
- Upgrading KDE Plasma 5.3 in Ubuntu 15.04 (Linux)
- Unable to solve the official version of Android Studio online update problem (Linux)
- MySQL 5.7 can not log in problem (Database)
- MySQL stored procedures and triggers (Database)
- How to disable IPv6 in the CentOS 7 (Linux)
- MongoDB configuration in Ubuntu 14.04 (Database)
- Troubleshooting Linux virtual machine device id and the letter of inconsistencies (Linux)
- Linux system started to learn: how to view the contents of the seed on the Linux file (Linux)
- Elixir: the future of programming languages (Programming)
- Java to achieve local fileCopy (Programming)
- Java Collections Framework interfaces map (Programming)
- Elasticsearch 2.20 Highlight (Server)
- How to install Linux Kernel 4.4 on Ubuntu (Linux)
- Hadoop connection failed or stuck processing (Server)
- Python is not C (Programming)
- To learn linux security (Linux)
- Java reflection Introduction (Programming)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.