论文部分内容阅读
系统安全记录文件操作系统内部的记录文件是检测是否有网络入侵的重要线索。如果您的系统是直接连到Internet,您发现有很多人对您的系统做Telnet/FTP登录尝试,可以运行“#more/var/log/secure greprefused”来检查系统所受到的攻击,以便采取相应的对策,如使用SSH来替换Telnet/rlogin等。启动和登录安全性1.BIOS安全设置BIOS密码且修改引导次序禁止从软盘启动系统。2.用户口令用户口令是linux安全的一个基本起点,很多人使用的用户口令过于简单,这等于给侵入者敞开了大门,虽然从理论上说,只要有足够的
System Security Log File The operating system’s internal log file is an important clue to detect whether there is network intrusion. If your system is directly connected to the Internet, you find that many people try Telnet / FTP to your system to log in. You can run “# more / var / log / secure greprefused” to check the system against the attack so that Take appropriate countermeasures, such as using SSH to replace Telnet / rlogin. Startup and Login Security 1. BIOS Security Setting the BIOS password and modifying the boot order Do not boot the system from a floppy disk. 2. User password User password is a basic starting point for linux security, many people use the user password is too simple, which is tantamount to opening up the door to the intruder, although in theory, as long as there is enough