Article Title: Practical! Nine rules to ensure Linux system security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
When you use a Linux operating system to handle security issues, the following rules and techniques may be useful.
1. Avoid regular work when logging on as root. This reduces the risk of virus infection and prevents you from making some mistakes.
2. If possible, try to use encrypted connections when working on a remote machine. SSH should be used to replace telnet, ftp, rsh, and rlogin as standard operation specifications. Because SSH security is well known.
3. Keep the most important network-related packages up to date. It is best to subscribe to corresponding email lists to get the latest release announcements for bind, postfix, ssh, and other programs. The same principle applies to software related to local security.
4. Disable any network services that you do not absolutely need for normal server operation. This will make your system more secure. You can use the netstat program to find the open port with the socket status of LISTEN.
5. RPM packages from SUSE are all digitally signed. You can enter the following content on the console to verify the integrity of any suse rpm package: rpm-chechsig package. rpm. The required public gpg-key must be copied to the root directory during installation.
6. Check the backup of user and system files frequently. Remember: if you do not test whether the backup works properly, it is useless.
7. Check your log files. If possible, write a small script program to search for suspicious items.
8. Enhanced security by using a firewall, especially tcp wrapper, can improve system security.
9. Set security measures to ensure redundancy. It is better to see some security messages than to see no messages.