Solved

Linux security scripts

Posted on 2000-02-14
4
172 Views
Last Modified: 2013-12-06
Can someone point me to an article on the net or some existing scripts that I can run as administrator so that I know my Linux site has not been compromised by an outsider?  My son set up my Red Hat 6.1 site this summer and I've been using Unix for over 20 years but I just don't have time to go fishing to find this solution.  We have our system on the net via an ADSL line so I know he made the system fairly secure, I just get hyper about these things!  ;-)
0
Comment
Question by:JJS
  • 3
4 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 2520839
A this point there's not any foolproof way to tell if the system has already been compromised. To do so would require, amoung other things, comparing the binaries of sensitive programs against "known good" copies. There are utilities like Tripwire that are used for intrusion detection, but they rely on having built a "picture" of the system before it was is ever exposed.

There are security scanners, like Satan, that can scan a system from the network looking for "known" vulnerabilities. Even if the system was originally set up as secure, changes in packages, usage, and practices may mean that it's not as secure now.

A good reference, with pointers to a lot more good references and tools is howto.tucows.com/LDP/HOWTO/Security-HOWTO.html.
0
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 2533487
Consider my comment to be the answer.
0
 

Author Comment

by:JJS
ID: 2552243
Thanks jlevie.  I had my husband go into the hospital for some heart problems.  Funny how people things distract you from machine problem! ;-)
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2552749
I'm always sorry to hear something like that, I hope things are better now.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
This article will explain how to establish a SSH connection to Ubuntu through the firewall and using a different port other then 22. I have set up a Ubuntu virtual machine in Virtualbox and I am running a Windows 7 workstation. From the Ubuntu vi…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question