After the installation is complete, there are many useless services by default, and these services are automatically started by default. In general, the less services you run, the higher the security of your system! Therefore, we need to close some unwanted services!
For example, a Linux server runs the WWW application, so other than the HTTPD service and system operation are necessary services, others can be shut down.
Below these services, you can choose to shut down, in general, without the need for:
Anacron, AUDITD, AutoFS, Avahi-daemon, AVAHI-DNSCONFD, Bluetooth, Cpuspeed, Firstboot, GPM, Haldaemon, Hidd, IP 6tables, IPSec, ISDN, LPD, Mcstrans, Messagebus, Netfs, NFS, Nfslock, NSCD, Pcscd Portmap, Readahead_eraly, Resto Recond, RPCGSSD, RPCIDMAPD, RSTATD, SendMail, Setroubleshoot, Yppasswdd Ypserv (basically, I've separated them with commas)
Chkconfig--level 345 bluetooth off//345 level bluetooth® does not start
The following are the services that the system must run:
Acpid: For power management, it's important for laptops and desktops
APMD: Advanced Power Energy Management Service to monitor battery performance
Kudzu: A service that detects changes in hardware, it is recommended to turn on
Crond: Provides running services for automatically scheduled processes under Linux, it is recommended to turn on
ATD: Similar to Crond, provides the same things that are specified at the specified time, with the same functionality as the Scheduled tasks under Windows
Iptables: Firewalls, very, very important.
XINETD: Core waiting process to support multiple network services
XFS: Services necessary to use the X Window desktop system
Network: Activates the script that has the configured networking interface, that is, the network card is started.
SSHD: Remote Login to Linux depends on this service.
Syslog: System Log
Above these services, it is recommended to open all, do not close! These services, it is best to remember Oh, the help of our work, will be very big
This article is from the "8174069" blog, please be sure to keep this source http://8184069.blog.51cto.com/8174069/1716990
LINUX Security Operations (II)