Difference between revisions of "Linux Security"

imported>Tele
imported>Fhdk
Line 56: Line 56:




== TIPS ==
== Tips ==


=== <p><span style="color: #008000;"><strong>YOU BE AWARE</strong></span></p> ===
=== Be alert ===
:: Everything you have on the devices, maybe one day be on the internet.
:: So, do not put things which you do not want on the internet


=== <p><span style="color: #008000;"><strong>FIREWALL</strong></span></p> ===
* Everything you have on your devices, maybe one day be on the internet.
* So, do not put things which you do not want on the internet
 
=== Firewall ===
* Read about firewalls
* Read about firewalls
* Read about IPv4 and IPv6, how check which you use, how disable not used
* Read about IPv4 and IPv6, how check which you use, how disable not used
Line 72: Line 73:
* Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity
* Read https://wiki.manjaro.org/index.php?title=Security_%26_Anonymity


=== <p><span style="color: #008000;"><strong>WEB BROWSER</strong></span></p> ===
=== Web browser ===
* Read what data is disclosed by the web browser
* Read what data is disclosed by the web browser
* Read about plugins: '''uBlock Origin''' , '''NoScript'''
* Read about plugins: '''uBlock Origin''' , '''NoScript'''
* Read why installing unknown or poor plugins can be dangerous.
* Read why installing unknown or poor plugins can be dangerous.


=== <p><span style="color: #008000;"><strong>E_MAIL</strong></span></p> ===
=== E-mail ===
* Read how to create aliases for your own mail and why can help you protect against spam or inform about a data leak
* Read how to create aliases for your own mail and why can help you protect against spam or inform about a data leak
* Read how how to automatically sort trusted emails
* Read how how to automatically sort trusted emails
Line 83: Line 84:
* Read about '''phishing''' and '''punycode phishing attack'''
* Read about '''phishing''' and '''punycode phishing attack'''
   
   
=== <p><span style="color: #008000;"><strong>SYSTEM PROCESSES</strong></span></p> ===
=== System processes ===
* Read about '''sandbox'''
* Read about '''sandbox'''
* Read how prevent a fork bomb by limiting user process
* Read how prevent a fork bomb by limiting user process


=== <p><span style="color: #008000;"><strong>GOOD HABITS</strong></span></p> ===
=== Habits ===
* Do not use commands if you do not know what they do
* Do not use commands if you do not know what they do
* Do not enter long commands, but '''copy''' and '''paste'''
* Do not enter long commands, but '''copy''' and '''paste'''
Line 100: Line 101:
** http://valerieaurora.org/hash.html
** http://valerieaurora.org/hash.html


=== <p><span style="color: #008000;"><strong>FILES</strong></span></p> ===
=== Files ===
* Read why we use '''sgid''' and why it can be dangerous
* Read why we use '''sgid''' and why it can be dangerous
* Read how find files with incorrect permissions and how find files with sgid
* Read how find files with incorrect permissions and how find files with sgid
Line 112: Line 113:
* Read about '''chkrootkit''' and '''rkhunter'''
* Read about '''chkrootkit''' and '''rkhunter'''


=== <p><span style="color: #008000;"><strong>IF YOU ARE A PROGRAMMER</strong></span></p> ===
=== Developers ===
* Read about attacks on environmental variables
* Read about attacks on environmental variables
* Read about attack on input files
* Read about attack on input files
Anonymous user