Difference between revisions of "Linux Security"

no edit summary
imported>Tele
imported>Tele
Line 58: Line 58:
:: So, do not put things which you do not want on the internet
:: So, do not put things which you do not want on the internet
* Read about firewalls
* Read about firewalls
* Read about IPv4 and IPv6, how check, how disable
* Read how read firewall logs
* Read how read firewall logs
* Read how find open ports
* Read how find open ports
Line 81: Line 82:
* Read why we use programs with a closed source code and why can be dangerous
* Read why we use programs with a closed source code and why can be dangerous
* Read about '''chkrootkit''' and '''rkhunter'''
* Read about '''chkrootkit''' and '''rkhunter'''
* Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity
* Read what data is disclosed by the web browser
* Read about GPG / GnuPG ''( Asymmetric encryption with 2 keys: private and public )''
:  for example https://wiki.manjaro.org/index.php?title=How-to_verify_GPG_key_of_official_.ISO_images
* Read about hash collisions
: https://en.wikipedia.org/wiki/Collision_attack
: http://valerieaurora.org/hash.html
* If you're a programmer:
* If you're a programmer:
** Read about attacks on environmental variables
** Read about attacks on environmental variables
Anonymous user