How to Protect Your Privacy on Linux

Configurare noua (How To)

Situatie

It’s easy to have a false sense of security, thinking that other operating system might be more targeted than Linux, but there are plenty of risks and vulnerabilities for all types of Linux devices. Keep your guard up regardless of your OS.

Solutie

Pasi de urmat

Ensure you use a password to protect your user account
This should be required, but even so, make sure you always use a strong, lengthy password.

Don’t use an admin account for daily activity
For everyday computing, log in with a basic or standard user account. This is likely to be the default behavior when creating a new account, but it’s worth double-checking your account’s status. Note that some system-wide actions will require you to log in with the administrator account because of restricted permissions.

Screenshot showing account types on Linux

Encrypt your data
Full disk encryption is ideal, but it’s also possible to encrypt just your home directory, for example on a shared machine. This is usually done during installation, and is difficult to do afterwards. In that situation, the easiest solution is to backup your data (always a good thing!) and then re-install the OS selecting encryption options.

Keep your system updated
It’s usually easy to keep both Linux and installed applications up to date. At the very least make sure updates for security are installed automatically.

Screenshot showing OS update dialog box on Linux

Periodically check for rootkits
This can be done by installing a rootkit detector such as chkrootkit, which is easily run with the command sudo chkrootkit.

Screenshot showing the use of the 'chkrootkit' command on Linux

Lock down remote connection settings
If you use SSH for remote access, there are some simple steps to reduce the risk of attack. The easiest is to use a port other than the default port 22 (and below 1024). You can also prevent remotely logging in as root with PermitRootLogin no in the SSH config file.

Screenshot of more secure SSH settings.

Turn off listening services you don’t need
Some daemons listen on external ports. Turn these services off if not needed, for example sendmail or bind. This could also improve boot times. To check for listening services, use this command: netstat -lt

Screenshot showing use of the 'netstat' command on Linux

Tip solutie

Permanent

Voteaza

(11 din 21 persoane apreciaza acest articol)

Despre Autor

Leave A Comment?