Home > linux, Security > Basic Linux Security for Beginners – Suitable For External and Internal Security Purpose!

Basic Linux Security for Beginners – Suitable For External and Internal Security Purpose!

http://figs.cyberciti.biz/blogs/tips_tricks/synaptic-debian-package-manager-snapshot.pngFrom many users points of view security is just about disconnect the computer system from the network or switch off the connection. These processes may some how effective but never stand for long term process to secure the desktops and servers from the outside intrusion.

Now day’s million of computer users have used the internet, so it is much difficult for everyone to follow the process every time. In case of big companies or corporate sectors, they can manage the security system through the expensive firewalls as well as the experts IT staff.

However, it is so expensive process that never suitable for everyone. In this regard, proper planning and systems configuration may help the users to protect their computer system from the outside interference.

Due to these sorts of problem the user are looking for the basic Linux security for beginners. It is offering maximum security system to the users through its manual which us also guiding the user a lot with other modes of the application. Due to better security reasons, the Linux OS is vastly used by the software and networking developer to maintain their security. It is much suitable for both the external and internal security purpose.

In this regard, the users can keep their business and system safe. In spite of inherent safety of platform, Linux users must not be very complacent. Bookmark page, join mailing list, as well as learn how you can configure & use software! Try that with ‘n’ option to see the port numbers in place of the service names.

After that you may see which service is now listening on this port using ‘lsof’. For every service that you shut down, you would like to ensure that it is not started up once again on next system start. It is been accomplished in different methods under every distribution. Normally, what those tools are in fact, doing is making or else destroying the links in /etc/rc.d/rc#.d/ directories.

Let us now look at a few of the links now. Try command: ‘m asked whether the Linux is as safe as Windows. Do not ask me while I have the mouthful of coffee, since coffee stains are hard removing from a few fabrics. Wherever possible, ensure Internet exposed hosts not just save the logs locally, but they log to host, which is safely in firewall.

 

 

 

Categories: linux, Security Tags: