Home > linux > Basic Linux Security Tips to Protect Your System!

Basic Linux Security Tips to Protect Your System!

Every computer users are concern about the security factor of their system. Therefore it is important to install a security packages on computer to save it from all hazards. For many tears Linux is providing some extra ordinary security packages for computers.

Linux provide many security packages for viruses and worm written for windows. Computers that are connected to the internet are the most vulnerable place for attackers. There are so many types of data recovery tools available that it doesn’t matter what Operating System was installed on the disk.

There are no golden rules for security. Security is such a thing that needs to be work upon and personalized. By installing Linux security packages you can make an attacker’s task difficult. By following some security tips you can surely protect your computers from attackers. The tips are the following.

  • Keep up with the security updates
  • Disable unnecessary services
  • Restrict root access
  • Don’t auto mount device
  • Don’t stay on the bleeding age
  • Don’t upgrade every six month

The main goal of Linux security packages to make sure you stay on the top of any security vulnerabilities. Due to several benefit Linux security packages are so popular among computers user.

This generally examines the network datagrams, searching for signatures of different common kinds of the attacks: CGI exploits, some kinds of the denial of the service attacks.

Maybe best known network IDS is Snort that is installed anything from the basic sniffer to sensor for comprehensive database- intrusion analysis system.

Big end of town is now making lots of noise regarding the intrusion prevention systems; and these are generally IDS’s with ability to automatically add the firewall rules that can block attack.

Linux world has this for many years in form of the PortSentry, application that is very hard to find on internet as company that made was taken over by the Cisco (however googling can turn that up). With the PortSentry installed, when somebody runs port scan & hits, say, port twenty, you may block the IP address.

Beauty of this is they can never figure you are running the vulnerable version of the SSH on a port 22 since they are all blocked prior to they get there.  In the firewall configurations, you may as well install the network intrusion system.

Categories: linux Tags: