In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
How to set the security of linux system? Many people do not understand, today, in order to let you know more about the linux system security settings, so give you a summary of the following content, let's look down together.
1. Download and install security software
2. Cancel Telnet login, adopt SSH mode and change the configuration of remote login on ssh server.
(1) the Telnet login protocol is unencrypted and insecure, so the more secure SSH protocol is adopted.
(2) change the configuration related to remote login on the ssh server.
Modify the default file path vim / etc/ssh/sshd_config modified parameter port # Port PermitEmptyPasswords # whether to allow users with an empty password to log in remotely to PermitRootLogin # whether to allow root to log in to UseDNS # specify whether sshd should reverse resolve the remote hostname to check whether the hostname really corresponds to its IP address. Default yes. It is recommended to change it to no, otherwise it may cause slow SSH connection. GSSAPIAuthentication no # solves the problem of slow SSH remote connection between linux ListenAddress # listens to the specified IP address batch operation: sed-ir'13 iPort 55666\ nPermitRootLogin no\ nPermitEmptyPasswords no\ nUseDNS no\ nGSSAPIAuthentication no' / etc/ssh/sshd_config
3. Related to user management
(1) delete unnecessary users and user groups.
(2) user password management
4. Check the system log
Your system log tells you what activities are taking place on the system, including whether the attacker successfully entered or tried to access the system. Always be vigilant, this is your first line of defense, and regular monitoring of system logs is to maintain this line of defense.
5. Close selinux
SELinux is a kernel mandatory access control security system, it is not recommended to open it if you do not understand its principle.
6. Patch the kernel
There is no system without bug and absolute security, and so is linux, which makes more kernel patches to enhance kernel security.
7. Turn off services that are not needed by the system
Some systems are equipped with a lot of unnecessary services, these unnecessary services will sometimes start to run, on the one hand, the operation takes up system resources, on the other hand, it is easy to cause security risks, you can choose to shut down.
8. Disable dangerous commands
Rm-rfdd if=/dev/random of=/dev/sda
The dd command erases the contents under / dev/sda and then writes random junk data, resulting in data contamination.
The above is a brief introduction to the security settings of the linux system. Of course, the differences in the detailed use of the above have to be understood by everyone. If you want to know more, welcome to follow the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.