Protect Yourself

This chapter will show you how to protect yourself comupter and your services.

Wish it can help you.

  • No Default Password , Change it And Use A Strong Password Policy
  • Change Some Default Port , like ssh
  • Close Unnecessary Port

  • Logging your service information

  • MAC Address
  • IP Address
  • Head of the host
  • Date Time
  • Asset number
  • Other Useful Information
  • Keep your Linux Kenel and Sofware Up to Date
  • Locking User Accounts After Login Failures
  • Make Sure No Non-Root Accounts Have UID Set To 0
  • No root to Directly Access Server
  • Use Access Control List (Blacklist or Whitelist)
  • Appropriate Permission
  • Close Unnecessary Service
  • Delete X Windows
  • Make Strategy to avoid Vulnerability
  • Configure Iptables and TCP Wrappers
  • BIOS Protect
  • Encypt your disk and protect your disk
  • boot directory was only read
  • No USB Access
  • Security your SSH
  • Only Access from special host
  • Use two factor authorization
  • change default port
  • NO root login
  • Avoid be vulnerable
  • Use IDS(Intrusion Detection System )
  • Protect your Directories and Email

When you do something , Just Ask yourself , What I want, Whether if It can be more Security ? Did there another way to make it easily ? You should ask yourself many times when you make a choice.

Reference :

results matching ""

    No results matching ""