In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
I. grub menu login control
In the Internet environment, most servers are managed by remote login, while the local boot and terminal login process are easy to be ignored, leaving security risks. Especially when the environment of the computer room where the server is located is lack of strict and safe control system, how to prevent the unauthorized intervention of other users has become a problem that must be paid attention to.
It is not safe for us to press ESC to go directly to the grub menu to change, so we have to set a user and password that can only be changed if we know these.
1. Back up first to prevent us from failing.
two。 To set the user and password in the configuration file
3. Rebuild the grub menu
4. Check to see if it works.
two。 Weak password detection
In an Internet environment, an overly simple password is the biggest risk to the server. Even though everyone knows the setting.
A longer and more complex password will be more secure, but there will always be some users who want convenience and adopt something simple and easy to remember.
Password string. For any administrator who is responsible for security, it is necessary to find out these weak password accounts in time.
This facilitates further security measures (such as reminding the user to reset a more secure password).
John the Ripper is an open source password cracking tool that can quickly analyze and identify known ciphertext.
The password string of the text, which supports DES, MD5 and other encryption algorithms, and allows the use of password dictionaries (including various password groups
List file) to carry out brute force cracking. By using John the Ripper, you can detect Linux/UNIX systems
The password strength of the user account.
1. Download and install John the Ripper
two。 We make it into a script file.
3. Compile
4. Analyze our users' accounts and passwords through dictionaries
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.