Summary of Common commands in Linux (7) Security Settings and Common commands in linux
Security Settings
Category
Command
Option
Annotation
Security PolicySelinux
Setenforce
Number (0, 1)
Set selinux status, 0 c
With the prevalence of open-source Linux, its applications in large and medium-sized enterprises are gradually becoming more popular. Many enterprise application services are built on it, such as Web services, database services, and cluster services. Therefore, the security of Linux has become a foundation for enterprises to build secure applications and a top pr
] ~]#/etc/profile or [[email protected] ~] #source/etc/profileMake the change effective, if there is no error stating the success.Verify that there is data in the log[Email protected] ~]# More/var/log/201107.log2011-07-21 17:29:08 ##### Root PTS/2 (192.168.23.250) # # # # # # # /etc/profileYou can see that there's already data inside.You can also usePrompt_command= ' {date ' +%y-%m-%d%T ##### USER: $USER IP: $SSH _client PS: $SSH _tty # # (History 1 | {read x cmd; echo "$cmd";}) ";} >> $HISTORY
In linux, how is security? Vt6102? Card ?? Sakura? -Linux general technology-Linux technology and application information. For details, refer to the following section. This is the instruction file in the downloaded driver.
Via pci 10/100 Mb Fast Ethernet Adapter
**
** Linux
Article Title: making Linux safer-thinking about security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Security Definition
With the popularity of Linux in Open source system, its application in large and medium-sized enterprises is becoming more and more popular, many enterprise application services are built on it, such as Web services, database services, cluster services and so on. Therefore, the security of Linux has become an enterprise to build a
processes. Kernel (System State, enter kernel space execution, run in process context), application process (user state, go into user space execution, run in kernel space). The processor runs at any time in one of the following three states: Runs in user space, executes user processes, runs in kernel space, is in the process context, executes on kernel processes, runs in kernel space, is in an interrupt context, and handles interrupts. Such as:The kernel of
. restrict the number of programs with the SUID permission flag. Programs with this permission flag run as root, which is a potential security vulnerability. Of course, some programs must have this flag, like the passwd program.
3. BIOS security. Set the BIOS password and modify the boot sequence to disable system startup from a floppy disk.
4. User Password. User passwords are the most basic starting point
Article Title: Ten Tips to ensure Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux has many advantages in terms of
eth0-m multiport-p UDP--dports 53,113,135,137,139,445-j DROP53,113,135,137,139,445 of messages dropped to UDP (primarily DNS, authentication, remote calls, files, and Printer sharing services) to the ETH0 network port# iptables-a input-i eth0-p UDP--dport 1026-j DROPPacket discards for 1026 ports that are accessing UDP on the Eth0 network port (10,261 as the next idle port, preventing port scanning)# iptables-a input-i eth0-m multiport-p tcp--dports 1433,4899-j DROPPacket discards for 1433 (SQL
Article Title: comprehensively improves the security performance of Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As we all know,
Brief Introduction to Linux security configuration steps-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Disk partitioning
1. If the system is newly installed, consider the security of Disk Partitions:
1) the ro
Article Title: Network Security Policies for Small and Medium-sized heterogeneous Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
At present, many small and medium users are
executable permission, here must be sure, otherwise you will regret;
2, replace the original bash is occupied, you can modify the original user's bash environment and then replace.
3. View recently changed files Find the. php file in the current directory that was modified in the last 24 hours, and list the details of find.-name ' *.inc '-mtime 0-ls find the regular files that were modified in the current directory, the last 1 days ago. find.-type f-mtime +1 Note: You
This article briefly introduces several Linux IDS intrusion detection tools, such as psad, Apparmor, and SELinuxu. First, let's take a look at the principles and practices of the intrusion detection system.
If you only have one computer, it is entirely possible for you to spend a lot of time carefully reviewing system vulnerabilities and problems. Maybe you don't really want this, but it does. However, in t
Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As Linux is an open-source free operating system
Article title: The Crazy Penguin series looks at the future of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Don't think that your
There is no absolutely secure system in the world. even a stable Linux system is widely considered to have shortcomings in terms of management and security. We expect the system to work at minimum risk, which requires enhanced management of system security. Next, I will elaborate on the shortcomings of Linux from two a
Article Title: Past and Present of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux itself is not a secure operatin
find users' phones, directories, and other important information. Therefore, many Linux systems cancel all or partially cancel these services to enhance system security.
In addition to setting system service items using/etc/Inetd. conf, inetd also uses the/etc/services file to find the ports used by various services. Therefore, you must carefully check the port settings in the file to avoid
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.