[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Linux security scripts

Posted on 2000-02-14
4
Medium Priority
?
184 Views
Last Modified: 2013-12-06
Can someone point me to an article on the net or some existing scripts that I can run as administrator so that I know my Linux site has not been compromised by an outsider?  My son set up my Red Hat 6.1 site this summer and I've been using Unix for over 20 years but I just don't have time to go fishing to find this solution.  We have our system on the net via an ADSL line so I know he made the system fairly secure, I just get hyper about these things!  ;-)
0
Comment
Question by:JJS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 2520839
A this point there's not any foolproof way to tell if the system has already been compromised. To do so would require, amoung other things, comparing the binaries of sensitive programs against "known good" copies. There are utilities like Tripwire that are used for intrusion detection, but they rely on having built a "picture" of the system before it was is ever exposed.

There are security scanners, like Satan, that can scan a system from the network looking for "known" vulnerabilities. Even if the system was originally set up as secure, changes in packages, usage, and practices may mean that it's not as secure now.

A good reference, with pointers to a lot more good references and tools is howto.tucows.com/LDP/HOWTO/Security-HOWTO.html.
0
 
LVL 40

Accepted Solution

by:
jlevie earned 300 total points
ID: 2533487
Consider my comment to be the answer.
0
 

Author Comment

by:JJS
ID: 2552243
Thanks jlevie.  I had my husband go into the hospital for some heart problems.  Funny how people things distract you from machine problem! ;-)
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2552749
I'm always sorry to hear something like that, I hope things are better now.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question