linux basic security

Posted on 2006-04-05
Last Modified: 2010-04-22
i have maintain rad hat linux 9 as our proxy server, i want to know what security steps should i maintain so that there ll be no problem for hacking
Question by:datta_tuhin
    LVL 3

    Expert Comment

    First, Red Hat Linux 9 is ancient, and I believe no longer being updated with security patches. Upgrade!

    Second, Linux security is an complex issue with whole books and websites devoted to the subject. Unless you're using someone's prepackaged software set, expect to spend a considerable amount of time researching this issue. You could start with a Google search for "linux security" or go to a bookstore with a good stock of computer books. Find something that fits your needs and knowledge level.

    Third, there is no such thing as "no problem for hacking", unless your server is not on the Internet. You can only reduce risk, never eliminate it.
    LVL 5

    Accepted Solution

    just u have to do following things, so the possible attack ll be minimize,

    1st dont use telnet , if u r using telnet just disable it.
    2nd use complex password for root and dont share with so many people.
    3rd use ssh for externally login , its use port 22 , try to use 435 or some other not use port.
    4th regularly check your log files
    5th dont use comman history.
     its the basic of security, u have to learn iptables for more


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    ​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
    Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    794 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now