Article Title: security settings for Linux operating systems. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Nowadays, system security is becoming more and more important. Here I want to write down some basic security measures that I usually use in linux to discuss with you, make our Linux system reliable.
1. BIOS Security Settings
This is the most basic and simple. You must set a password for your BIOS to prevent starting from a floppy disk by changing the startup sequence in the BIOS. This will prevent others from trying to start your system with a special boot disk, and prevent others from entering the BIOS to modify the settings so that the hardware settings of the machine cannot be changed at will.
2. LILO Security Settings
LILO is short for LInux LOader, which is the startup module of LINUX. You can modify the content in the "/etc/lilo. conf" file for configuration. Add the following two parameters to the/etc/lilo. conf file: restricted and password. These three parameters allow your system to require password verification when starting lilo.
Step 1: edit the lilo. conf file (vi/etc/lilo. comf). If you change the three parameters:
Boot =/dev/hda Map =/boot/map Install =/boot. B Prompt Timeout = 00 # Set this line to 00. In this way, the system starts LINUX directly instead of waiting. Message =/boot/message Linear Default = linux Restricted # Join this line Password = # Add this line and set your own password Image =/boot/vmlinuz-2.4.2-2 Label = linux Root =/dev/hda6 Read-only |
Step 2: because the "/etc/lilo. conf" file contains the plaintext password, set it to the root permission for reading.
# Chmod 0600/etc/lilo. conf |
Step 3: update the system to make modifications to the "/etc/lilo. conf" file.
[1] [2] [3] Next page