Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 43

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 42
7. General Tips
This section will quickly address some general concepts for maintaining a more secure and reliable system or
network. Let's emphasize "maintaining" here since computer systems change daily, as does the environment
around them. As mentioned before, there isn't any one thing that makes a system secure. There are too many
variables. Security is an approach and an attitude more than it is a reliance on any particular product,
application or specific policy.
Do not allow remote root logins. This may be controlled by a configuration file such as
/etc/securetty. Remove any lines that begin "pts". This is one big security hole.
In fact, don't log in as root at all. Period. Log in on your user account and su to root when needed.
Whether the login is remote or local. Or use sudo, which can run individual commands with root
privileges. (Red hat includes a sudo package. ) This takes some getting used to, but it is the
"right" way to do things. And the safest. And will become more a more natural way of doing this as
time goes on.
I know someone is saying right now "but that is so much trouble, I am root, and it is my system".
True, but root is a specialized account that was not ever meant to be used as a regular user account.
Root has access to everything, even hardware devices. The system "trusts" root. It believes that you
know what you are doing. If you make a mistook, it assumes that you meant that, and will do it's best
to do what you told it to do...even if that destroys the system!
As an example, let's say you start X as root, open Netscape, and visit a web site. The web page has
badly behaved java script. And conceivably now that badly written java script might have access to
much more of your system than if you had done it the "right" way.
Take passwords seriously. Don't give them out to anyone. Don't use the same one for everything.
Don't use root's password for anything else −− except root's password! Never sign up or register on
line, using any of your system passwords. Passwords should be a combination of mixed case letters,
numbers and/or punctuation and a reasonable length (eight characters or longer). Don't use so−called
"dictionary" words that are easy to guess like "cat" or "dog". Don't incorporate personal information
like names or dates or hostnames. Don't write down system passwords −− memorize them.
Use the more secure "shadow" passwords. This has been the default on Red Hat for some time now.
If the file /etc/shadow exists, then it is enabled already. The commands pwconv and grpconv,
can be used to convert password and group files to shadow format if available.
Avoid using programs that require clear text logins over untrusted networks like the Internet.
Telnet is a prime example. ssh is much better. If there is any support for SSL (Secure Socket
Layers), use it. For instance, does your ISP offer POP or IMAP mail via SSL? Recent Red Hat
releases do include openssl, and many Linux applications can use SSL where support is available.
Set resource limits. There are various ways to do this. The need for this probably increases with the
number of users accessing a given system. Not only does setting limits on such things as disk space
prevent intentional mischief, it can also help with unintentionally misbehaved applications or
processes. quota (man quota) can be used to set disk space limits. Bash includes the
ulimit command (man ulimit or man bash), that can limit various functions on a per user basis.
Also, not discussed here at any length, but PAM (Pluggable Authentication Modules) has a very
sophisticated approach to controlling various system functions and resources. See man pam to get
started. PAM is configured via either /etc/pam.conf or /etc/pam.d/*. Also files in
7. General Tips 40
Vedere la pagina 42
1 2 ... 38 39 40 41 42 43 44 45 46 47 48 ... 81 82

Commenti su questo manuale

Nessun commento

Gembird MHP-EP-001-W manuali

Manuali dei proprietari e guide per l'utente per Cuffie Gembird MHP-EP-001-W.
We fornisce 1 manuali pdf Gembird MHP-EP-001-W per scaricare gratuitamente in base al tipo di documento: Scheda Tecnica


Gembird MHP-EP-001-W Scheda Tecnica (1 pagine)


Marchio: Gembird | Categoria: Headphones | Dimensione: 0.16 MB |

 

Indice





Più prodotti e manuali per Cuffie Gembird

Modelli Tipo di Documento
A4-GHCR-170R Scheda Tecnica   Gembird A4-GHCR-170R headphone, 1 pagine
BHP-001 Manuale Utente   Gembird BHP-001 User Manual, 13 pagine
AP-880-5.1 Manuale Utente    Gembird AP-880-5.1 Manuel d'utilisation, 10 pagine
BHP-002 Manuale Utente   Gembird BHP-002 User Manual, 14 pagine
AP-830 Manuale Utente    Gembird AP-830 Manuel d'utilisation, 9 pagine
AP-860 Manuale Utente    Gembird AP-860 Manuel d'utilisation, 9 pagine
BHP-KBP-B Manuale Utente      Gembird BHP-KBP-B User Manual, 14 pagine
BHP-BER-BK Manuale Utente      Gembird BHP-BER-BK User Manual, 12 pagine
MHS-123 Manuale Utente      Gembird MHS-123 User Manual, 8 pagine
MHS-108 Manuale Utente    Gembird MHS-108 Manuel d'utilisation, 9 pagine
WHS-104 Manuale Utente    Gembird WHS-104 Benutzerhandbuch, 12 pagine