Under the Linux operating system to prevent hacking skills

  

A lot of people are learning Linux operating system, when we use the Linux operating system to access the Internet, you may encounter hacker attacks, this article introduces you to the Linux operating system against hackers Some practical tips.

Linux is a multi-user system. Once someone gets your root user, he can do whatever he wants on your system. Because a single user has full control over the system, if it is not properly operated or When others enter, the consequences will be unimaginable. How to prevent the entry of a single user, there are several aspects of attention.

1. Protect the /etc/inittab file. If you change the 3 in id:3:initdefault to 1, you can directly enter the single-user mode each time you start. For the /etc/inittab file, enter as root and pass the chown 700 /etc/inittab to set the attribute to other users and you can't modify it.

2, if you are using the lilo way to boot, you may use linuxconf or directly modify lilo.conf to set the waiting time input time to 0 or the shortest line. In this case, if you enter the single-user mode, you can boot with a floppy disk.

3, if you use the GRUB way to boot, the easiest way is to use the GRUB password to protect the boot options.

4, in order to prevent others from remote damage, the system is restarted, in addition to the ROOT password and the file in the /etc directory for effective management, you should also set the password for CMOS, so even if the system is changed In the single-user mode, you can't directly start the computer to operate.

This way, you have learned some practical skills to prevent hackers under the Linux operating system, and better Internet surfing.

Copyright © Windows knowledge All Rights Reserved