Five Things To Know About Linux Security

Five Things To Know About Linux Security 

You need not be a security expert to work with Linux, but be cautious. Whether you use Linux for work or play some basic security principles apply. Don’t pick up Linux with a lot of misconceptions about security rather, according to www.linux.com, be wary of these mentioned facts.
• Linux is Not Immune to Everything:A Linux distribution is more secure than Windows not because the software on Linux is free of security vulnerabilities, but there are fewer exploits for those vulnerabilities. However, you will find fewer exploits like Conficker targeting Linux. Though new Linux enthusiasts and junior admins think that Linux is immune to security exploits, it is not true. The difference is in where the weak spots are, how exploits are deployed, and what kind of attacks you should be concerned about. Desktop users are still vulnerable to some browser-based exploits. Even if a system isn't rooted, services can be disrupted. Worms like Santy can deface sites and use a server as a springboard to attack other sites. The bottom line is you have to realize that Linux systems can be vulnerable to attack, and you need to think about system security whether you're a desktop user or administering servers.
• But You Don't Need an Antivirus:If you are just off Windows, you might wonder about the antivirus programs for Linux. But you don’t need one here like McAfee Antivirus or Norton Antivirus as Linux doesn't have problems with the same kind of viruses and malware that Windows does. You can install one if you want, but you will find nothing that is a threat to your system. An antivirus like clamAV will scan for known trojans, viruses, etc. that affect Windows systems, helping you to find an infected file that would harm a Windows system. Now the question is the kind of threats Linux users face? Typically attacks via network services, like worms and Cross-site scriptingattacks that work on any browser on any OS and social engineering work on any platform. Phishing attempts to get users to supply personal and financial information, rely on a user being fooled by an email or Web site.
• Prevention is Better than Cure:Being proactive is remarkably easy, so be a little proactive. First, subscribe to your vendor's security list as you would then be notified of known problems quickly and potential fixes. You'll see quite a few emails on this list if the project or vendor is doing its job. Any third party software of significance should have a security list of some sort or a channel that it uses to announce security updates. Security updates come through distributions a little slowly than through the upstream vendors at times. Second, run updates regularly.to make sure and update third-party software that isn't patched through your update tools.
• Understand User Permissions and Encryption:Make sure your system is locked down. Ubuntu and openSUSE feature AppArmor for users who want to enhance system security and lock down services. Fedora uses SELinux. Familiarize yourself with these tools to ensure that system services are locked down, or not running at all if they're not necessary. Make sure you understand the permissions system for Linux and that files are not more accessible than necessary. If you're running services on a shared hosting service, this is important. If you are running Linux on your home PC, netbook or laptop, encrypt your home partition. If someone has physical access to your machine they don't need to know your root or user passwords to get at your data when it's not encrypted.
• Audit and Use Intrusion Detection:Finally, consider installing intrusion detection on any server that you're administering, using tools like chkrootkit to verify that your system is not compromised. Some attackers deface websites or use an exploited system to launch attacks on other systems. Others quietly collect passwords or data or run services like IRC bots or use infected systems to send spam. If you adminis..
#CyberError

2 comments : Leave Your Comments


  1. If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

    Email: cybergoldenhacker at gmail dot com

    ReplyDelete
  2. The Borgata is one of the top casino-resorts in the world - Dr.
    The Borgata, 보령 출장안마 a hotel and 제천 출장마사지 casino, is one of the top casino hotels 전주 출장안마 in the world, with the name "Borgata." Borgata's 과천 출장안마 signature resort and casino is one 천안 출장샵 of the

    ReplyDelete