Linux workstation security check list
Target readers
This document is intended for users who use Linux workstations to access and manage system administrators in the project infrastructure team.
If your team's system administrator is a remote engineer, you can use this document to help them ensure that their workstation meets the most basic
. restrict the number of programs with the SUID permission flag. Programs with this permission flag run as root, which is a potential security vulnerability. Of course, some programs must have this flag, like the passwd program.
3. BIOS security. Set the BIOS password and modify the boot sequence to disable system startup from a floppy disk.
4. User Password. User passwords are the most basic starting point
Article Title: Ten Tips to ensure Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux has many advantages in terms of
Basic techniques of Linux security management Chinese information position http://www.cnxxz.net Author: greenice
Linux as an open source of the free operating system, with its highly efficient implicit quality, more and more users are welcome, and in the world continues to spread. It is believed that Linux will get big
eth0-m multiport-p UDP--dports 53,113,135,137,139,445-j DROP53,113,135,137,139,445 of messages dropped to UDP (primarily DNS, authentication, remote calls, files, and Printer sharing services) to the ETH0 network port# iptables-a input-i eth0-p UDP--dport 1026-j DROPPacket discards for 1026 ports that are accessing UDP on the Eth0 network port (10,261 as the next idle port, preventing port scanning)# iptables-a input-i eth0-m multiport-p tcp--dports 1433,4899-j DROPPacket discards for 1433 (SQL
Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to Windows, there are many new challenges to ensure the security and reliability of the Linux operating system. This article focuses on Linux system
Article title: The Crazy Penguin series looks at the future of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Don't think that your
Article Title: comprehensively improves the security performance of Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As we all know,
Brief Introduction to Linux security configuration steps-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Disk partitioning
1. If the system is newly installed, consider the security of Disk Partitions:
1) the ro
Article Title: Network Security Policies for Small and Medium-sized heterogeneous Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
At present, many small and medium users are
#more/var/log/secure grep refused to check it out.
2. Limit the number of programs with SUID permission flags, the program with that permission flag running as root is a potential security vulnerability, of course, some programs must have the logo, like the passwd program.
3.BIOS security. Setting the BIOS password and modifying the boot order prevents booting the system from the floppy disk.
4. User pa
Linux Security Basics: network configuration commands and linux basic configuration commands
1. ifconfig view and configure network interface information(1) set an IP addressIfconfig eth0 192.168.0.1(2) temporarily disable or enable the NICIfconfig eth0 downIfconfig eth0 up(3) set the subnet maskIfconfig eth0 netmask 255.255.255.0(4) view the status of the first
Although Linux is a multi-user system like the Windows nt/2000 system, there are a number of important differences between them. For many administrators accustomed to Windows systems, there are many new challenges to ensuring that Linux operating systems are secure and reliable. This article will focus on the Linux system sec
needFive, Linux physical securityPhysical security protection of the serverSet the password to grub, even if the attacker is physically in contact with the operating systemLocking the terminal with VlockVi. information collection of cyber securityNetwork host Survival TestPingNmapTelnetNetwork host survivability Test protectionInstall the firewall to screen out the ping test.Installs snort time to detect s
Article Title: Linux security overview. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As Linux is an open-source free operating system
There is no absolutely secure system in the world. even a stable Linux system is widely considered to have shortcomings in terms of management and security. We expect the system to work at minimum risk, which requires enhanced management of system security. Next, I will elaborate on the shortcomings of Linux from two a
Article Title: Past and Present of Linux security. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux itself is not a secure operatin
find users' phones, directories, and other important information. Therefore, many Linux systems cancel all or partially cancel these services to enhance system security.
In addition to setting system service items using/etc/Inetd. conf, inetd also uses the/etc/services file to find the ports used by various services. Therefore, you must carefully check the port settings in the file to avoid
. User passwords are the most basic starting point for Linux Security. many users use simple 'password', which opens the door to intruders, although theoretically there is no uncertain user password, it can be used as long as there is enough time and resources. A good user password is a string of characters that can only be easily remembered and understood by himself, and should never be written anywhere.
5
BKJIA: Many Linux servers are not new machines just deployed. Professional Linux system administrators perform regular maintenance, IT technicians often need to take full responsibility for the security of their servers. If your server is intruded, not only is all sensitive information exposed, but the server itself may cause larger damage to attackers. To avoid
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.