Article Title: Protection against hacker skills in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Many people are learning about the Linux operating system. When we use the Linux operating system to access the Internet, we may encounter hacker attacks. This article describes some practical techniques for preventing hackers in the Linux operating system.
Linux is a multi-user system. Once a root user is obtained, he can do whatever he wants on your system. Because a single user has full control permissions on the system, if the operation is improper or is entered by others, the consequences will be unimaginable. There are several considerations to prevent the entry of a single user.
1. Protect the/etc/inittab file. If you change 3 in id: 3: initdefault to 1, you can directly access the single-user mode at each startup. For the/etc/inittab file, use the root identity to enter the chown 700/etc/inittab and set the attribute to something other users cannot modify.
2. If the lilo mode is used for boot, you may use linuxconf or directly modify lilo. conf to set the waiting time for the boot to 0 or the shortest time. In this case, if you enter the single-user mode, you can use a floppy disk for boot.
3. If GRUB is used for boot, the simplest method is to use the GRUB Password to protect the startup options.
4. In order to prevent remote damage and restart the system, in addition to effectively managing the ROOT password and files in the/etc directory, the CMOS password should also be set, in this way, even if the system is changed to a single user mode, the computer cannot be started directly.
In this way, you will learn some practical skills to prevent hackers in the Linux operating system and enjoy a better online experience.