Solved

Linux security scripts

Posted on 2000-02-14
4
171 Views
Last Modified: 2013-12-06
Can someone point me to an article on the net or some existing scripts that I can run as administrator so that I know my Linux site has not been compromised by an outsider?  My son set up my Red Hat 6.1 site this summer and I've been using Unix for over 20 years but I just don't have time to go fishing to find this solution.  We have our system on the net via an ADSL line so I know he made the system fairly secure, I just get hyper about these things!  ;-)
0
Comment
Question by:JJS
  • 3
4 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 2520839
A this point there's not any foolproof way to tell if the system has already been compromised. To do so would require, amoung other things, comparing the binaries of sensitive programs against "known good" copies. There are utilities like Tripwire that are used for intrusion detection, but they rely on having built a "picture" of the system before it was is ever exposed.

There are security scanners, like Satan, that can scan a system from the network looking for "known" vulnerabilities. Even if the system was originally set up as secure, changes in packages, usage, and practices may mean that it's not as secure now.

A good reference, with pointers to a lot more good references and tools is howto.tucows.com/LDP/HOWTO/Security-HOWTO.html.
0
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 2533487
Consider my comment to be the answer.
0
 

Author Comment

by:JJS
ID: 2552243
Thanks jlevie.  I had my husband go into the hospital for some heart problems.  Funny how people things distract you from machine problem! ;-)
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2552749
I'm always sorry to hear something like that, I hope things are better now.
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Backup & Restore 3 55
cannot rename datastore 3 45
ignore other .htaccess 2 45
awk to variable in bash 2 42
If you use Debian 6 Squeeze and you are tired of looking at the childish graphical GDM login screen that is used by default, here's an easy way to change it. If you've already tried to change it you've probably discovered that none of the old met…
This article will explain how to establish a SSH connection to Ubuntu through the firewall and using a different port other then 22. I have set up a Ubuntu virtual machine in Virtualbox and I am running a Windows 7 workstation. From the Ubuntu vi…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question