Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Tele (Tips) |
imported>Tele |
||
Line 60: | Line 60: | ||
* Read how read firewall logs | * Read how read firewall logs | ||
* Read how find open ports | * Read how find open ports | ||
* Read how find applications that use the internet and how to block | |||
* Read how to find listen to the connections / applications. | * Read how to find listen to the connections / applications. | ||
:: Secure passwords should be encrypted | |||
* Read about sandbox | * Read about sandbox | ||
* Read how prevent a fork bomb by limiting user process | * Read how prevent a fork bomb by limiting user process | ||
* Do not use commands if you do not know what they do | * Do not use commands if you do not know what they do | ||
* Do not enter long commands, but '''copy''' and '''paste''' | * Do not enter long commands, but '''copy''' and '''paste''' | ||
* Do not use '''root account''' if you don't need. | * Do not use '''root account''' if you don't need. | ||
* Read why we use '''sgid''' and why it can be dangerous | * Read why we use '''sgid''' and why it can be dangerous |