The following rules and tricks may come in handy when you use the Linux operating system to handle security issues.
1. When logging in as root, avoid doing some regular work. This will reduce your risk of getting a virus and prevent you from making some mistakes.
2. If possible, use an encrypted connection when working on a remote machine. Using SSH instead of telnet, ftp, rsh, rlogin should be the standard operating specification. Because the security of SSH is well known.
3. Try to keep up-to-date with the most important packages related to the network. It is best to subscribe to some corresponding mailing lists to get the latest version of the announcements for bind, postfix, ssh, etc. The same principles apply to software related to local security.
4. Disable any network services you don't absolutely need for the server to work properly. This will make your system more secure. You can use the netstat program to find open ports with a socket status of LISTEN.
5. RPM packages from SUSE are digitally signed. You can verify the integrity of any SUSE RPM package by typing the following on the console: rpm — chechsig package.rpm. The required public gpg-key is copied to the root home directory during installation.
6. Always check the backup of user and system files. Remember: If you don't test if the backup works, it's useless and worthless.
7. Check your log file. Whenever possible, write a small script to search for suspicious items.
8. Use a firewall to enhance security, especially with tcp wrapper to improve system security.
9. Set security measures to ensure redundancy. It’s always better to see more security messages than to have no news.
disk partitioning under Linux, file system formatting and raid devicecomparing disk partition format
According to statcounter statistics, the global operating system market share in March is still Win7
nmap is a network port scanner. Its main function is to check a group of target hosts to see which
A few days ago, a Linux system administrator asked the author for help. He said th
Linux scp command using tutorial
Linux SSH connection login delay solution
Introduction to libraries under Windows and Linux
Linux awk array operation details
Loading a simple module on the Linux 2.6.12 kernel
Epoll use detailed explanation
Linux operating system network card installation guide (below)
In the future, Linux wants to put Flash in Chrome
Linux server attack and defense technology detailed
Linux vsftp configuration tutorial
IE9 browser win7 hand in the ten unknown function (3)
Win10 official version of Chinese can not enter how to do?
At your fingertips Windows 8 common touch operations at a glance
The economic outlook is worrisome. Nonferrous metals have been hit hard.
Win XP system application skills network application articles
Deploying Cloud Computing Which data center hardware should be reserved