You should log in and post some comments! The link is up there in the toolbar. Go nuts!
Securing Your Linux Based System
Normal 0 false false false EN-US X-NONE X-NONE Now a day, computers which use internet are vulnerable to attacks by the hackers, Although it is not possible to make your computer immune to those attacks but you can secure your Linux computer for those attacks and make it difficult for attackers to compromise your system. There is no magic to stop those attacks but all you can do is securing your computer and with open source operating systems it is very easy to secure your computer and all of your files. Here are some of the tips on how to secure your Linux based systems. Locking your computer: While it is not possible to lock your computer and store in some place physically, but you can set a bios password for your computer which is hard-to-decipher password and with this you can keep your computer safe from attackers locally. It also helps in preventing unauthorized access to your computer. Restricting access: Restricting root access is one of the best methods in securing your computer. Especially if you own a web server in your Linux machine, it is very good idea to restrict root access so that the website hosted in the Linux machine we will be safe from the hackers. Even if an attacker attacked your computer, he will need the root password for executing some kind of commands in the Linux machine. It is also best to restrict the usage of specific commands to the normal users in the Linux machine, so that they will be restricted of executing some important system commands. Firewalls: Firewalls are very good in securing your Linux system. One of the most commonly used firewall in Linux systems are iptables, however you can get lot of other firewalls from the internet. These firewalls are used for filtering unwanted traffic to your computer. These are very useful in case of DDos attacks. Most Linux distributions come with firewalls integrated in their distribution but however you need some knowledge in networking in configuring the firewall in your system. Disable auto mounting: Disable auto mounting of CD’s and USB drives, as those disks may contain viruses which will run automatically after they mounted. These viruses will then modify your system files and then makes a way to the attacker to attack your computer easily. Also disable auto sharing of your files over your network and make it to prompt password in order to access your files over the network. In this way, your files will be secured. Check Integrity: It is advised to check the integrity of the software before installing it in your computer. An RPM package will have an option to check the integrity of the software. There are other open source tools available on the internet to check the integrity of the software.