Article Title: configure a Secure linux system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. Set a complex password.
2. disable unnecessary accounts.
When a hacker attacks, it is difficult to obtain the user name and password. Try to prevent hackers from entering this level.
3. Remove unnecessary compiling environments from the official server. In this way, hackers cannot develop and compile programs on top even if they come in with common user permissions.
4. Do not store the kernel source code tree and header files in linux.
5. Restrict the directories accessible to common users. Do not access unnecessary directories.
6. Disable the function of loading the driver from the kernel.
7. Hide some version information of linux. In this way, it is difficult for hackers to perform operations in the kernel.
8. Remove unnecessary commands. Save the list of these commands.
9. Save a list of programs running in the system.
10. disable unnecessary network ports.