A lot of people are learning Linux operating system, when we use the Linux operating system to access the Internet, you may encounter hacker attacks, this article introduces you to the Linux operating system against hackers Some practical tips.
Linux is a multi-user system. Once someone gets your root user, he can do whatever he wants on your system. Because a single user has full control over the system, if it is not properly operated or When others enter, the consequences will be unimaginable. How to prevent the entry of a single user, there are several aspects of attention.
1. Protect the /etc/inittab file. If you change the 3 in id:3:initdefault to 1, you can directly enter the single-user mode each time you start. For the /etc/inittab file, enter as root and pass the chown 700 /etc/inittab to set the attribute to other users and you can't modify it.
2, if you are using the lilo way to boot, you may use linuxconf or directly modify lilo.conf to set the waiting time input time to 0 or the shortest line. In this case, if you enter the single-user mode, you can boot with a floppy disk.
3, if you use the GRUB way to boot, the easiest way is to use the GRUB password to protect the boot options.
4, in order to prevent others from remote damage, the system is restarted, in addition to the ROOT password and the file in the /etc directory for effective management, you should also set the password for CMOS, so even if the system is changed In the single-user mode, you can't directly start the computer to operate.
This way, you have learned some practical skills to prevent hackers under the Linux operating system, and better Internet surfing.
ReiserFS file system is a very good file system, especially for large files or a large number of sma
A public IP is a public address that is assigned by InterNIC and consists of a class-based network I
Starting today, I officially entered the development of tiny4412. Today I mainly watched the startu
See many online how to ask how to configure the linux system nat Internet, now write an article here
Linux to view a port usage and kill
When nginx starts, it is free to enter the SSL certificate password
Linux driver development details
How to boot Linux system from DOS system
Explain in detail the practical security of home Linux
The number of file handles that can be opened at the Linux system level file-max command
The difference between Linux synchronous/asynchronous and blocking/non-blocking
How to fix garbled Win7 Notepad?
Windowsazure often problems and solutions
Some of the setup techniques in Win2008
Windows7 Home Basic (Home Basic) x64 official ISO image how to download
How to set Win7 system dot matrix printer
Explain what adsl is and what it means.
How to set up a Linux system under a RAID array