Keep in mind the four major points of hacking against hacking in Linux

  

On the Microsoft system, everyone is worried about what to do if they are hacked. Do you have to worry about it on the Linux system? Of course, you have to worry. All systems are the same. Hackers will attack, so protection. Self-system security is a big project. Linux is a multi-user system. Once someone gets your root user, he can do whatever he wants on your system. Since a single user has full control over the system, if it is not properly operated or accessed by others, the consequences will be Unexpectedly, how to prevent access to a single user, there are several aspects of attention.

1. Protect the /etc/inittab file. If you change the 3 in id:3:initdefault to 1, you can directly enter the single-user mode each time you start. For the /etc/inittab file, enter as root and pass the chown 700 /etc/inittab to set the attribute to other users and you can't modify it.

2, if you are using the lilo way to boot, you may use linuxconf or directly modify lilo.conf to set the waiting time input time to 0 or the shortest line. In this case, if you enter the single-user mode, you can boot with a floppy disk.

3, if you use the GRUB way to boot, the easiest way is to use the GRUB password to protect the boot options.

4, in order to prevent others from remote damage, the system is restarted, in addition to the ROOT password and the file in the /etc directory for effective management, you should also set the password for CMOS, so even if the system is changed In the single-user mode, you can't directly start the computer to operate.

Although the Linux system is not commonly used, if you have major files or privacy in it, you can't easily cause damages. You should keep in mind the above four points to prevent hackers from attacking. It is helpful to everyone.

Copyright © Windows knowledge All Rights Reserved