Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Tele |
imported>Tele |
||
Line 68: | Line 68: | ||
* Do not enter long commands, but '''copy''' and '''paste''' | * Do not enter long commands, but '''copy''' and '''paste''' | ||
* Do not use '''root account''' if you don't need. | * Do not use '''root account''' if you don't need. | ||
* Read about '''two-factor authentication''' | |||
* Read why we use '''sgid''' and why it can be dangerous | * Read why we use '''sgid''' and why it can be dangerous | ||
* Read how find files with incorrect permissions and how find files with sgid | * Read how find files with incorrect permissions and how find files with sgid | ||
Line 79: | Line 80: | ||
* Read why untested packages from outside the repository can be dangerous | * Read why untested packages from outside the repository can be dangerous | ||
* Read why we use programs with a closed source code and why can be dangerous | * Read why we use programs with a closed source code and why can be dangerous | ||
* Read about '''chkrootkit''' and '''rkhunter''' | |||
* If you're a programmer: | * If you're a programmer: | ||
** Read about attacks on environmental variables | ** Read about attacks on environmental variables |