Difference between revisions of "Linux Security"

Removing information without instructions or practical advice, see the "Discussion" page for more rationale.
imported>Dalto
m (Moved sandboxing to it's own section)
imported>Dalto
(Removing information without instructions or practical advice, see the "Discussion" page for more rationale.)
Line 140: Line 140:


One method of sandboxing is using Firejail.  Please the [[Firejail|Firejail Wiki page]] for more information on installing and configuring Firejail.
One method of sandboxing is using Firejail.  Please the [[Firejail|Firejail Wiki page]] for more information on installing and configuring Firejail.
=GPG keys=
* GPG keys can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and still will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. But it is useful for checking from which the package repository comes from, if we use several repositories and if we are able to verify.
=Understanding processes=
* You can change the priorities of processes.
* You can display the process tree. '''pstree''' command
* You can check a list of new processes from time to time
* You can check what file the process comes from. You can also check to which package a file belongs.
* You can detect "zombie" processes and delete them.
* You can limit the maximum number of processes. This is protection against fork bomb attack, but it does not guarantee system stability, if the user's process will be important for the stability of the system.
==Apps==
( It's hard to adjust the place, so I allowed myself such modifications )
* You can limit the number of services running at once with the system. It is less likely to have an application with a security gap.
* You can control the crontab task list of each user
* You can control folder or folders from which scripts or programs are run at system startup.
* Try to update applications if there are any security patches available
* You can verify the origin of the application




[[Category:Contents Page]]
[[Category:Contents Page]]
Anonymous user