Difference between revisions of "Linux Security"

no edit summary
imported>Tele
imported>Tele
Line 68: Line 68:
* Do not enter long commands, but '''copy''' and '''paste'''
* Do not enter long commands, but '''copy''' and '''paste'''
* Do not use '''root account''' if you don't need.
* Do not use '''root account''' if you don't need.
* Read about '''two-factor authentication'''
* Read why we use '''sgid''' and why it can be dangerous
* Read why we use '''sgid''' and why it can be dangerous
* Read how find files with incorrect permissions and how find files with sgid
* Read how find files with incorrect permissions and how find files with sgid
Line 79: Line 80:
* Read why untested packages from outside the repository can be dangerous
* Read why untested packages from outside the repository can be dangerous
* Read why we use programs with a closed source code and why can be dangerous
* Read why we use programs with a closed source code and why can be dangerous
* Read about '''chkrootkit''' and '''rkhunter'''
* If you're a programmer:
* If you're a programmer:
** Read about attacks on environmental variables
** Read about attacks on environmental variables
Anonymous user