Просмотр сообщений
|
Страниц: [1]
|
4
|
Основная категория / Форум про "траву" (травиан) / ZNNet Announcements - Hot Topic Spotlight News
|
: Октябрь 04, 2011, 04:25:43
|
Summary: Any operating system can be cracked if you don’t adequately protect it. Yes, even Linux hosting . Here are some security basics on how to protect your Linux systems hosting . Linux hosting is, by design, a very secure operating system, but so what? You can have the best security system in the world on your house, but if you leave your front-door open anyone can still walk in. Even people who know better, like Linux kernel developers, blow it sometimes. That’s what happened to the Linux Foundation’s constellation of sites. Multiple important Linux sites were down for weeks and as of October 3rd, kernel.org is still down. This doesn’t have to happen to you. Here are a few simple suggestions from me, and some more advanced ones from Greg Kroah-Hartman, one of Linux’s lead developers. First, here are some rules that everyone should know. Number one with a bullet is security expert Bruce Schneier’s mantra, “Security is a process, not a product.” I don’t care that your server was Fort Knox, two weeks ago, if you haven’t updated your system with the latest security patches, checked to make sure your users haven’t started running a porn Web server, and looked over your network logs to see if someone or something isn’t up to mischief then you can’t trust your system today. In addition, as Kroah-Hartman wrote, “it is imperative that nobody falls victim to the belief that it cannot happen to them. We all need to check our systems for intrusions.” And, I might add, we need to keep doing it all the time. Therefore, make darn sure that your root password, which should really be a passphrase, not a password, isn’t been being used by anyone than you. If your users really need fuller access than they usually get to the system, provide them with sudo access. Thinking of users: Lock them down. Give them only as much permission hosting and access as they absolutely must have. If it turns out they need access to say a group file directory give it to them after they’ve shown a need for it, not before. While you’re at it, set their home hosting directories to be encrypted. Moving on to the network hosting, every system connected to the Internet needs a firewall set up to, once again, give users the absolute minimum of needed access. If someone doesn’t need to use a network port, that port should be blocked. Period. End of statement more hosting info http://www.basishost.com/ That’s all security 101 stuff. Kroah-Hartman gets into more technical detail. Still, what he’s suggests doesn’t require you be some kind of security ninja. You just need to know and practice some Linux administration basics. For starters if you have any suspicion that your system has been compromised Kroah-Hartman suggests that you need a clean install of your operating system. If, you have everyone’s home directories in a separate home partition-which you should-you can reinstall your operating system during an idle period and no one will even be the wiser that everything has been refreshed. After that, Kroah-Hartman suggests that you “verify that your package signatures match what your package manager thinks they are. To do this on a rpm-based system, [such as Red Hat or openSUSE] run the following command: Web site hosting Domain hosting linux hosting 1-Click Script Installs! hosting WordPress! hosting Joomla! hosting Drupal! hosting 1. http://www.basishost.com/Hosting/ $3,75/mo Basic Hosting plan 2 http://www.basishost.com/ $2,75/mo WordPress hosting Plan 3 http://www.basishost.com/vps/ $15,75/mo Basic VPS Linux Web Server
|
|
|
5
|
Основная категория / Форум про "траву" (травиан) / ZNNet Announcements - Hot Topic Spotlight News
|
: Октябрь 04, 2011, 04:25:15
|
Summary: Any operating system can be cracked if you don’t adequately protect it. Yes, even Linux hosting . Here are some security basics on how to protect your Linux systems hosting . Linux hosting is, by design, a very secure operating system, but so what? You can have the best security system in the world on your house, but if you leave your front-door open anyone can still walk in. Even people who know better, like Linux kernel developers, blow it sometimes. That’s what happened to the Linux Foundation’s constellation of sites. Multiple important Linux sites were down for weeks and as of October 3rd, kernel.org is still down. This doesn’t have to happen to you. Here are a few simple suggestions from me, and some more advanced ones from Greg Kroah-Hartman, one of Linux’s lead developers. First, here are some rules that everyone should know. Number one with a bullet is security expert Bruce Schneier’s mantra, “Security is a process, not a product.” I don’t care that your server was Fort Knox, two weeks ago, if you haven’t updated your system with the latest security patches, checked to make sure your users haven’t started running a porn Web server, and looked over your network logs to see if someone or something isn’t up to mischief then you can’t trust your system today. In addition, as Kroah-Hartman wrote, “it is imperative that nobody falls victim to the belief that it cannot happen to them. We all need to check our systems for intrusions.” And, I might add, we need to keep doing it all the time. Therefore, make darn sure that your root password, which should really be a passphrase, not a password, isn’t been being used by anyone than you. If your users really need fuller access than they usually get to the system, provide them with sudo access. Thinking of users: Lock them down. Give them only as much permission hosting and access as they absolutely must have. If it turns out they need access to say a group file directory give it to them after they’ve shown a need for it, not before. While you’re at it, set their home hosting directories to be encrypted. Moving on to the network hosting, every system connected to the Internet needs a firewall set up to, once again, give users the absolute minimum of needed access. If someone doesn’t need to use a network port, that port should be blocked. Period. End of statement more hosting info http://www.basishost.com/ That’s all security 101 stuff. Kroah-Hartman gets into more technical detail. Still, what he’s suggests doesn’t require you be some kind of security ninja. You just need to know and practice some Linux administration basics. For starters if you have any suspicion that your system has been compromised Kroah-Hartman suggests that you need a clean install of your operating system. If, you have everyone’s home directories in a separate home partition-which you should-you can reinstall your operating system during an idle period and no one will even be the wiser that everything has been refreshed. After that, Kroah-Hartman suggests that you “verify that your package signatures match what your package manager thinks they are. To do this on a rpm-based system, [such as Red Hat or openSUSE] run the following command: Web site hosting Domain hosting linux hosting 1-Click Script Installs! hosting WordPress! hosting Joomla! hosting Drupal! hosting 1. http://www.basishost.com/Hosting/ $3,75/mo Basic Hosting plan 2 http://www.basishost.com/ $2,75/mo WordPress hosting Plan 3 http://www.basishost.com/vps/ $15,75/mo Basic VPS Linux Web Server
|
|
|
6
|
Основная категория / Форум про "траву" (травиан) / ZNNet Announcements - Hot Topic Spotlight News
|
: Октябрь 04, 2011, 04:24:51
|
Summary: Any operating system can be cracked if you don’t adequately protect it. Yes, even Linux hosting . Here are some security basics on how to protect your Linux systems hosting . Linux hosting is, by design, a very secure operating system, but so what? You can have the best security system in the world on your house, but if you leave your front-door open anyone can still walk in. Even people who know better, like Linux kernel developers, blow it sometimes. That’s what happened to the Linux Foundation’s constellation of sites. Multiple important Linux sites were down for weeks and as of October 3rd, kernel.org is still down. This doesn’t have to happen to you. Here are a few simple suggestions from me, and some more advanced ones from Greg Kroah-Hartman, one of Linux’s lead developers. First, here are some rules that everyone should know. Number one with a bullet is security expert Bruce Schneier’s mantra, “Security is a process, not a product.” I don’t care that your server was Fort Knox, two weeks ago, if you haven’t updated your system with the latest security patches, checked to make sure your users haven’t started running a porn Web server, and looked over your network logs to see if someone or something isn’t up to mischief then you can’t trust your system today. In addition, as Kroah-Hartman wrote, “it is imperative that nobody falls victim to the belief that it cannot happen to them. We all need to check our systems for intrusions.” And, I might add, we need to keep doing it all the time. Therefore, make darn sure that your root password, which should really be a passphrase, not a password, isn’t been being used by anyone than you. If your users really need fuller access than they usually get to the system, provide them with sudo access. Thinking of users: Lock them down. Give them only as much permission hosting and access as they absolutely must have. If it turns out they need access to say a group file directory give it to them after they’ve shown a need for it, not before. While you’re at it, set their home hosting directories to be encrypted. Moving on to the network hosting, every system connected to the Internet needs a firewall set up to, once again, give users the absolute minimum of needed access. If someone doesn’t need to use a network port, that port should be blocked. Period. End of statement more hosting info http://www.basishost.com/ That’s all security 101 stuff. Kroah-Hartman gets into more technical detail. Still, what he’s suggests doesn’t require you be some kind of security ninja. You just need to know and practice some Linux administration basics. For starters if you have any suspicion that your system has been compromised Kroah-Hartman suggests that you need a clean install of your operating system. If, you have everyone’s home directories in a separate home partition-which you should-you can reinstall your operating system during an idle period and no one will even be the wiser that everything has been refreshed. After that, Kroah-Hartman suggests that you “verify that your package signatures match what your package manager thinks they are. To do this on a rpm-based system, [such as Red Hat or openSUSE] run the following command: Web site hosting Domain hosting linux hosting 1-Click Script Installs! hosting WordPress! hosting Joomla! hosting Drupal! hosting 1. http://www.basishost.com/Hosting/ $3,75/mo Basic Hosting plan 2 http://www.basishost.com/ $2,75/mo WordPress hosting Plan 3 http://www.basishost.com/vps/ $15,75/mo Basic VPS Linux Web Server
|
|
|
|