Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 45

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 44
Even if it is just one LAN box to another.
If you find you need to run a particular service, and it is for just you, or maybe a relatively small
number of people, use a non−standard port. Most server daemons support this. For instance,
sshd runs on port 22 by default. All worms and script kiddies will expect it there, and look for it
there. So, run it on another port! See the sshd man page.
What about firewalls that block Internet connections according to the application (like
ZoneAlarm from Windowsdom)? These were designed with this feature primarily because of the
plethora of virii and trojans that are so common with MS operating systems. This is really not a
problem on Linux. So, really no such application exists on Linux at this time. And there does not
seem to be enough demand for it that someone has taken the time to implement it. A better firewall
can be had on Linux, by following the other suggestions in this document.
Lastly, know your system! Let's face it, if you are new to Linux, you can't already know something
you have never used. Understood. But in the process of learning, learn how to do things the right
way, not the easiest way. There is several decades of history behind "the right way" of doing things.
This has stood the test of time. What may seem unnecessary or burdensome now, will make sense in
due time.
Be familiar with whatever services you are running, and the implications these services might have to
the overall health of your system if something does go wrong. Read what you can, and ask questions.
Don't run something as a service "just because I can", or because the installer put it there. You can't
start out being an experienced System Administrator clearly. But you can work to learn enough about
your own system, that you are in control. This is one thing that separates *nix from MS systems: we
can never be in complete control with MS, but we can with *nix. Conversely, if something bad
happens, we often have no one else to blame.
Security Quick−Start HOWTO for Red Hat Linux
7. General Tips 42
Vedere la pagina 44
1 2 ... 40 41 42 43 44 45 46 47 48 49 50 ... 81 82

Commenti su questo manuale

Nessun commento