Sunday, July 4, 2010

Belgian Draft Horse Mart

Ubuntu (I) - Introduction

One
the issues of most concern to newcomers to Ubuntu is the security (especially if coming from Windows). However, most bring misconception and myths based on the movies than in reality hackers. For this reason I am going to devote a series of articles giving an overview at all levels Ubuntu security, clarifying doubts, demystifying hoaxes and giving extra information for those wishing to pursue the subject.
This article is a guide and an index of what I will publish in future articles.

    safety myths
  • Ubuntu (and GNU / Linux in general) are secure systems and should not worry about security: FALSE
security depends on the system used, but also options configuration and level of knowledge of the administrator.
With a good firewall I am 100% sure: FALSE The firewall is only one element to determine the safety of a system, but there are many more. Only It's better to root for so no permission issues: FALSE need to activate the root account in Ubuntu to do the job "x": FALSE In Ubuntu root user should never enter the system. For that you use sudo.
Windows viruses can affect me in Ubuntu: No virus

FALSE Windows (at least to date) affect GNU / Linux. Although it has been reported that certain cases of malware running through wine. + Info


Users and key user accounts ensures the privacy of information, the correct distribution of privileges in the system and minimize the effects if a security breach. A good set of key users is the foundation of a strong safety.


  1. Always use secure passwords and not even if you disable a little annoying.
  2. + info


  3. insurance

  4. Repositories Repositories are sources that distributions like Ubuntu get the software, using unsafe or unauthenticated repositories could result in the entry of malicious software on our system.
  5. To avoid this always use official repositories or repositories signed key.
+ info

Firewall
Among the many functions of a firewall is to increase the security of our network connections using filters that analyze the origin, destination, port and other data related to these connections.

This layer of security is especially important for those services that you offer through the local network or internet (mail server, web hosting, remote desktop ...)
+ info
SELinux / AppArmor

is an extra layer of security to confine processes applications and / or users, according to predetermined security policies, thus preventing that exceed their duties or malicious software is used to exploit its potential vulnerabilities. + info


Antivirus
    Unlike Windows where a good antivirus (and certainly more than one) is absolutely necessary, in Ubuntu we hardly need this level of security.


Yet there are few cases where it may be useful, for example, scanning a Windows partition or USB devices, scanning Windows machines through the network, adding an antivirus filter our internal mail server or avoid infection of applications running with Wine. + info


system analysis tools
    There are several utilities that help you analyze your system, check your weaknesses, major intrusions and vulnerabilities.


port scanners, search engines rootkit or full security suites.
+ info


records all events that occur in the system are recorded somewhere, including in relation to external connections and security.

Learn to locate and analyze this information will give us valuable information on system status and any shortcoming in safety.

detect and expel intruders
  • Although much more difficult than some people think, either by our carelessness or by a vulnerability in Ubuntu, could be the case that a user (or program) sneak past into our system without permission.

how to act in these cases depend on whether this situation will occur or not.
More

https: / / help.ubuntu.com/8.04/serverguide/C/user-management.html

https: / / help.ubuntu.com / community / https
  • Firewall : / / help.ubuntu.com / community / Repositories / Ubuntu


http://www.osnews.com/story/23463/Linux_Security_-_a_Few_Useful_Tactical_Tips

Related Articles
    firewall
  • gufw Administration
  • Administration



firewall with firestarter

ufw firewall administration



0 comments:

Post a Comment