Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Tele |
imported>Tele |
||
Line 58: | Line 58: | ||
:: So, do not put things which you do not want on the internet | :: So, do not put things which you do not want on the internet | ||
* Read about firewalls | * Read about firewalls | ||
* Read about IPv4 and IPv6, how check, how disable | |||
* Read how read firewall logs | * Read how read firewall logs | ||
* Read how find open ports | * Read how find open ports | ||
Line 81: | Line 82: | ||
* Read why we use programs with a closed source code and why can be dangerous | * Read why we use programs with a closed source code and why can be dangerous | ||
* Read about '''chkrootkit''' and '''rkhunter''' | * Read about '''chkrootkit''' and '''rkhunter''' | ||
* Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity | |||
* Read what data is disclosed by the web browser | |||
* Read about GPG / GnuPG ''( Asymmetric encryption with 2 keys: private and public )'' | |||
: for example https://wiki.manjaro.org/index.php?title=How-to_verify_GPG_key_of_official_.ISO_images | |||
* Read about hash collisions | |||
: https://en.wikipedia.org/wiki/Collision_attack | |||
: http://valerieaurora.org/hash.html | |||
* If you're a programmer: | * If you're a programmer: | ||
** Read about attacks on environmental variables | ** Read about attacks on environmental variables |