Difference between revisions of "Linux Security"
→TIPS
imported>Tele |
imported>Fhdk (→TIPS) |
||
Line 56: | Line 56: | ||
== | == Tips == | ||
=== | === Be alert === | ||
=== | * Everything you have on your devices, maybe one day be on the internet. | ||
* So, do not put things which you do not want on the internet | |||
=== Firewall === | |||
* Read about firewalls | * Read about firewalls | ||
* Read about IPv4 and IPv6, how check which you use, how disable not used | * Read about IPv4 and IPv6, how check which you use, how disable not used | ||
Line 72: | Line 73: | ||
* Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity | * Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity | ||
=== | === Web browser === | ||
* Read what data is disclosed by the web browser | * Read what data is disclosed by the web browser | ||
* Read about plugins: '''uBlock Origin''' , '''NoScript''' | * Read about plugins: '''uBlock Origin''' , '''NoScript''' | ||
* Read why installing unknown or poor plugins can be dangerous. | * Read why installing unknown or poor plugins can be dangerous. | ||
=== | === E-mail === | ||
* Read how to create aliases for your own mail and why can help you protect against spam or inform about a data leak | * Read how to create aliases for your own mail and why can help you protect against spam or inform about a data leak | ||
* Read how how to automatically sort trusted emails | * Read how how to automatically sort trusted emails | ||
Line 83: | Line 84: | ||
* Read about '''phishing''' and '''punycode phishing attack''' | * Read about '''phishing''' and '''punycode phishing attack''' | ||
=== | === System processes === | ||
* Read about '''sandbox''' | * Read about '''sandbox''' | ||
* Read how prevent a fork bomb by limiting user process | * Read how prevent a fork bomb by limiting user process | ||
=== | === Habits === | ||
* Do not use commands if you do not know what they do | * Do not use commands if you do not know what they do | ||
* Do not enter long commands, but '''copy''' and '''paste''' | * Do not enter long commands, but '''copy''' and '''paste''' | ||
Line 100: | Line 101: | ||
** http://valerieaurora.org/hash.html | ** http://valerieaurora.org/hash.html | ||
=== | === Files === | ||
* Read why we use '''sgid''' and why it can be dangerous | * Read why we use '''sgid''' and why it can be dangerous | ||
* Read how find files with incorrect permissions and how find files with sgid | * Read how find files with incorrect permissions and how find files with sgid | ||
Line 112: | Line 113: | ||
* Read about '''chkrootkit''' and '''rkhunter''' | * Read about '''chkrootkit''' and '''rkhunter''' | ||
=== | === Developers === | ||
* Read about attacks on environmental variables | * Read about attacks on environmental variables | ||
* Read about attack on input files | * Read about attack on input files |