-
When you're dealing with security with a Linux operating system, some of the following rules and tricks may come in handy.
1.When logging in as root, avoid doing some routine work. This will reduce your risk of contracting the virus and can prevent you from making some mistakes.
2.If possible, use an encrypted connection when working on a remote machine. The use of SSH instead of TELNET, FTP, RSH, and RLOGIN should be a standard practice. Because the security of SSH is well known.
3.Try to keep the most important web-related packages up to date, and it's a good idea to subscribe to some of the corresponding mailing lists to get announcements about the latest versions of bind, postfix, ssh, etc. The same principle applies to software related to local security.
4.Disable any network services that you don't absolutely need for your server to function properly. This will make your system more secure. Open ports with a socket status of listen can be found using the netstat program.
5.RPM packages from SUSE are digitally signed. You can verify the integrity of any SUSE RPM package by entering the following on the console:
rpm — chechsig 。The required public gpg-key is to be copied to root's home directory at the time of installation.
6.Check the backups of user and system files frequently. Remember: if you don't test that your backup is working, it's worthless.
9.Set up security measures to ensure their redundancy. It's always better to see more security messages than no ones at all.
-
1. Linux supports multi-user, multi-process, multi-thread, multi-platform, good interface and rich network functions.
2.Rapid patching of security and vulnerabilities.
If you're a big fan of the internet, you'll hear it most often"There is no absolute shouting that there is an absolutely secure host".That's right, though.
Due to the large number of supporters of Linux, there are quite a lot of enthusiastic groups and individuals involved in the development of linux, so Linghuai can get the latest security information at any time and update it at any time, that is, it is relatively safe.
3.It can run on 386 and above and a variety of RISC architecture machines.
Linux was first born in the microcomputer environment, and a series of versions have made full use of the task switching ability of x86cpu, so that the performance of x86cpu can be fully exerted, which even windows has not done. In addition, it can run well on machines built with various mainstream RISC chips (Alpha, MIPS, PowerPC, Ultrasparc, HP-PA, etc.).
Because its source is open, there are vulnerabilities that will be fixed quickly.
In recent years, more and more professionals choose to apply for CMA, CMA learning is more boring is the knowledge of system control and security measures, and today the deep space network will be interpreted in detail for candidates. >>>More
Answer]: The research on the security protection of the operating system usually includes the following contents: First, the security functions and security services provided by the operating system itself. >>>More
Computer information systems are not secure, and their insecurity factors include the computer information system itself, natural, and man-made. >>>More
With the popularization of computers, computer operating systems are also increasingly affecting people's lives and work. However, with the continuous development of computer technology and the popularization of the Internet, computer systems are also facing more and more security threats. For users, ensuring the security of the computer operating system has become an important task. >>>More