LINUX Security Operations (II)

Source: Internet
Author: User
Tags system log

After the installation is complete, there are many useless services by default, and these services are automatically started by default. In general, the less services you run, the higher the security of your system! Therefore, we need to close some unwanted services!


For example, a Linux server runs the WWW application, so other than the HTTPD service and system operation are necessary services, others can be shut down.


Below these services, you can choose to shut down, in general, without the need for:

Anacron, AUDITD, AutoFS, Avahi-daemon, AVAHI-DNSCONFD, Bluetooth, Cpuspeed, Firstboot, GPM, Haldaemon, Hidd, IP 6tables, IPSec, ISDN, LPD, Mcstrans, Messagebus, Netfs, NFS, Nfslock, NSCD, Pcscd Portmap, Readahead_eraly, Resto Recond, RPCGSSD, RPCIDMAPD, RSTATD, SendMail, Setroubleshoot, Yppasswdd Ypserv (basically, I've separated them with commas)


Chkconfig--level 345 bluetooth off//345 level bluetooth® does not start


The following are the services that the system must run:

Acpid: For power management, it's important for laptops and desktops

APMD: Advanced Power Energy Management Service to monitor battery performance

Kudzu: A service that detects changes in hardware, it is recommended to turn on

Crond: Provides running services for automatically scheduled processes under Linux, it is recommended to turn on

ATD: Similar to Crond, provides the same things that are specified at the specified time, with the same functionality as the Scheduled tasks under Windows

Iptables: Firewalls, very, very important.

XINETD: Core waiting process to support multiple network services

XFS: Services necessary to use the X Window desktop system

Network: Activates the script that has the configured networking interface, that is, the network card is started.

SSHD: Remote Login to Linux depends on this service.

Syslog: System Log


Above these services, it is recommended to open all, do not close! These services, it is best to remember Oh, the help of our work, will be very big

This article is from the "8174069" blog, please be sure to keep this source http://8184069.blog.51cto.com/8174069/1716990

LINUX Security Operations (II)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.