How to enable Firestarter to automatically start Linux Enterprise Application-Linux server application when logging on as a common user is as follows. Generally, you are prompted to enter the administrator password when you click the Firestarter icon or manually start Firestarter
Article title: use FireStarter to Achieve Internet sharing. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Preface
FireStarter is a firewall configuration tool based on GTK + and i
How to solve the problem of Firestarter startup-Linux Enterprise Application-Linux server application information. See the following for details. I am used to using windows. I don't have a firewall, so I always feel that I can't bear it. Fortunately, firestarter is included in ubuntu. It's useless to manage it. After I
In the morning, I used to enable the firewall in Ubuntu11.04 and reported an error. It looks like the error in firestarter 8.04 is the same as that in firestarter. It's still a problem with the configuration file value (wondering why this problem persists) first show me the upgraded version www.linuxidc.com @ linuxidc :~ $ Lsb_release-aNoLSBmodulesareavailable.DistributorID: nbsp
In the morning, I used to
Now our Ubuntu8.10 system has been basically installed. Now we have installed Firestarter firewall for it and made relevant settings. Start the terminal of Ubuntu8.10 and install the Firestarter firewall sudoapt-getinstallfirestarter (for example, 1). After installation, go to the application- gt; Internet- gt; Firestarter (SEE ).
Now our Ubuntu 8.10 system has b
Firestarter-gtk program for managing and observing your firewall
In debian/ubutu system
You can use the below command to install it:
$ Sudo apt-get install firestarter
Firestarter Official Website.
The access speed of this site is violent and slow. Please refer to the screenshot for relevant content.
Firestarter_sudo.png
Description:
First, copy firestarter to the desktop shortcut, and then click Properties. Click the content of the commands copied by the initiator to enter the preference session, add the session, and copy the command just now, enter the name. Other Ubuntu auto-start settings can be set like this. I am a newbie, so all my Ubuntu settings are like this! In this way, you don't have to wait to ask experts.
First copy firestarter
set the Linux firewall and system security independently in Linux text mode.
Since many new users have a special liking for setting quick and convenient software tools in Windows, here we will introduce two firewall tools based on GUI in Linux.
One is the commercial version of Storm Firewall, which is a product of Stormix technology. Many system administrators m
try it, you will know that no virus is found in my Linux. If the Windows system file is infected with a virus and cannot be started, use it to kill it!
Installation steps:Rpm-IVH pavcl_linux_i386.rpm
After the installation, run the "pavcl scan directory-Aex-CLV" command on the terminal to prevent viruses.E. g: pavcl/root-Aex-CLV
For more commands, enter "pavcl-help" in the terminal. [Download Now]
Firewall:
Fires
workstation and copy it to the firewall.
Firestarter
The second is Firestarter, which is an excellent graphical firewall generation wizard that can guide you step by step through the firewall building process. This is a good option for a NAT firewall that shares a unique public IP address with the LAN, and after the firewall, it also has some public services or a separated DMZ. It has some simple command
A basic skill for all Linux systems and network administrators is to know how to write a strong iptables firewall from the beginning, and how to modify it to adapt it to different situations. However, in the real world, this seems to be rare. Learning iptables is not a simple process, but I recommend the following information on the Internet to you, so that you can use it easily.
I believe that all administrators should thoroughly understand Iptables.
A basic skill for all Linux systems and network administrators is to know how to write a strong iptables firewall from the beginning, and how to modify it to adapt it to different situations. However, in the real world, this seems to be rare. Learning iptables is not a simple process, but I recommend the following information on the Internet to you, so that you can use it easily.
I believe that all administrators should thoroughly understand Iptables.
A basic skill for all Linux systems and network administrators is to know how to write a strong iptables firewall from the beginning, and how to modify it to adapt it to different situations. However, in the real world, this seems to be rare. Learning iptables is not a simple process, but I recommend the following information on the Internet to you, so that you can use it easily.
I believe that all administrators should thoroughly understand Iptables
policies. However, do not run the firewall generator on your real firewall because it requires X Windows. You need to run the script on a workstation and copy it to the firewall.Firestarter The second is Firestarter, which is an excellent graphical firewall generation wizard that can guide you step by step through the firewall building process. This is a good option for a NAT firewall that shares a unique public IP address with the LAN, and after the
a built-in firewall, deploying a software firewall in a Linux system is very easy and you will benefit from it.
Graphic firewalls, such as Firestarter, are very suitable for defining port forwarding and monitoring activity rules.
III. counterattack: starting from the system
Attackers have full control over the Linux server and can completely shut down or even
the Internet, and hackers have very limited access to your computer, it does not mean that you do not need to be defended. Add password protection to the boot program to ensure that it is always locked when you leave the computer. And you should be sure that no one can start your server from an external device.
6. Deploy a firewallThis sounds like the most "obvious" suggestion (just like using a strong password), but it is surprising that few people actually set up a firewall. Even if your v
rely on the Internet, and hackers have very limited access to your computer, it does not mean that you do not need to be defended.
Add password protection to the boot program to ensure that it is always locked when you leave the computer. And you should be sure that no one can start your server from an external device.
6. Deploy a firewall
This sounds like the most "obvious" suggestion (just like using a strong password), but it is surprising that few people actually set up a firewall. Even if
Stormix technology. Many system administrators may be familiar with this product.
The other is completely free Free Software Firestarter, which can be used in GNOME desktop environments. Both firewall software provides graphic characters of ipchains, eliminating the trouble of configuring the firewall in a rigid text environment, this allows users of the home network to easily complete firewall security settings on the
In linux, use the Flying Pigeon file (to solve the problem where the user is 0)-Linux general technology-Linux technology and application information. For more information, see the following. In windows, you can use the Flying Pigeon file. in linux, can you?
In fact, in linux
people actually set up a firewall. Even if your vro may have a built-in firewall, deploying a software firewall in a Linux system is very easy and you will benefit from it.Graphic firewalls, such as Firestarter, are very suitable for defining port forwarding and monitoring activity rules.2. disable unnecessary NetworksIn general, all services except http, smtp, telnet, and ftp should be canceled, such as t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.