In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
Cloud Virtual Machine How to configure linux server configuration more secure? Most users believe that Cloud Virtual Machine is relatively safe, especially Linux system, open source and stable. We feel we can benefit from higher security with some useful Linux server security hardening tips, especially if it contains sensitive data.
root account Use strong password policy
Use the useradd / usermod command to create and maintain root accounts. Make sure you have a strong password policy. For example, a strong password consists of at least 8 characters long, and a mixture of letters, numbers, special characters, upper and lower letters, etc.
Minimizing packages reduces vulnerabilities in Linux
Avoid installing unnecessary software to avoid software bugs. Use RPM package managers such as yum or apt-get and/or dpkg to view all installed package sets on your system. Remove all unwanted packages.
# yum list installed# yum list packageName# yum remove packageName# dpkg --list # dpkg --info packageName# apt-get remove packageName
Avoid FTP, Telnet, and Rlogin / Rsh
In most network configurations, anyone on the same network using a packet sniffer can capture usernames, passwords, FTP / telnet / rsh commands, and transferred files.
Use OpenSSH, SFTP or FTPS (FTP over SSL) to add FTP or TLS encryption to FTP. Enter the following yum command to remove NIS, rsh, and other obsolete services:
# yum erase xinetd ypserv tftp-server telnet-server rsh-server
Encrypting data traffic on Linux servers
All data transmitted over the network can be monitored. Encrypt data transmitted by cloud hosts with passwords or with keys/certificates whenever possible.
Use scp, ssh, rsync or sftp for file transfers. You can also use special tools like sshfs and fuse to mount remote server file systems or your own home directory. GnuPG supports encryption and signature of data and communication, and has a universal Key Management Service and access modules for various public key directories.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.