LINUX TIPS
1️⃣Never use weak passwords
For some reason, everyone thinks that the attacker does not want to pick up your password. Perhaps he really will not do it. But in case of server compromise, the cracker will receive a file with password hashes of all users. When trying to recover hash values, weak passwords are the first to succumb. And given that many users often use the same password wherever possible, the consequences can be sad.
Password must be at least 11 characters long, contain letters in both registers, numbers and special characters. You can’t think of such a password - use the password generator.
Learn to remember passwords, and not write them on a piece of paper and sculpt to the monitor.
2️⃣Set a password on the BIOS
A BIOS password, in some cases, can make it difficult for an attacker to access your data.
3️⃣ Be sure to disable unused services
Do not use ssh? Disconnect! Is the web server running? Do you really need it? If you do not know how to display a list of working services and disable some of them, use auxiliary software.
4️⃣Update quickly and completely.
Install all patches that are related to security. Try to update as quickly as possible. Holes are often found in programs and while the user thinks about the need to update (and some even postpone updates for several days), vulnerabilities in programs are exploited, rootkits are installed, which are then quite difficult to clean up.
By the way, there is a funny Linux Mint distribution in which security updates are divided into categories: “it can be installed”, “you can wait with it” and “but you can not install it at all”. If you need security, then avoid using such distributions.
5️⃣There are also enemies in LAN
Do not trust local network users. Many provide the resources of their computer to users from the local network. This approach to security policy is partially justified, because it’s easier for a local attacker to calculate and put a stool on his head, which stops many potential hackers. But an attacker from an external network can gain access to one of the computers on the local network and launch attacks from him.
6️⃣ Protect your privacy
Learn the built-in security features of your distribution. Many distributions provide the ability to remove traces of user activity, as browsers allow you to delete the cache and browsing history. For example, in Ubuntu, you can go to "System Preferences" and select "Privacy" to indicate what types of user activity should not be monitored.
7️⃣Use encryption. Whenever possible
Many programs have an option to encrypt data. Carefully study all the features provided and see how they could help you strengthen the overall security of the system. Encryption complicates an inconspicuous data substitution and protects police officers from unnecessary questions when they come to seize your computer.
Enjoy ❤️👍🏻
1️⃣Never use weak passwords
For some reason, everyone thinks that the attacker does not want to pick up your password. Perhaps he really will not do it. But in case of server compromise, the cracker will receive a file with password hashes of all users. When trying to recover hash values, weak passwords are the first to succumb. And given that many users often use the same password wherever possible, the consequences can be sad.
Password must be at least 11 characters long, contain letters in both registers, numbers and special characters. You can’t think of such a password - use the password generator.
Learn to remember passwords, and not write them on a piece of paper and sculpt to the monitor.
2️⃣Set a password on the BIOS
A BIOS password, in some cases, can make it difficult for an attacker to access your data.
3️⃣ Be sure to disable unused services
Do not use ssh? Disconnect! Is the web server running? Do you really need it? If you do not know how to display a list of working services and disable some of them, use auxiliary software.
4️⃣Update quickly and completely.
Install all patches that are related to security. Try to update as quickly as possible. Holes are often found in programs and while the user thinks about the need to update (and some even postpone updates for several days), vulnerabilities in programs are exploited, rootkits are installed, which are then quite difficult to clean up.
By the way, there is a funny Linux Mint distribution in which security updates are divided into categories: “it can be installed”, “you can wait with it” and “but you can not install it at all”. If you need security, then avoid using such distributions.
5️⃣There are also enemies in LAN
Do not trust local network users. Many provide the resources of their computer to users from the local network. This approach to security policy is partially justified, because it’s easier for a local attacker to calculate and put a stool on his head, which stops many potential hackers. But an attacker from an external network can gain access to one of the computers on the local network and launch attacks from him.
6️⃣ Protect your privacy
Learn the built-in security features of your distribution. Many distributions provide the ability to remove traces of user activity, as browsers allow you to delete the cache and browsing history. For example, in Ubuntu, you can go to "System Preferences" and select "Privacy" to indicate what types of user activity should not be monitored.
7️⃣Use encryption. Whenever possible
Many programs have an option to encrypt data. Carefully study all the features provided and see how they could help you strengthen the overall security of the system. Encryption complicates an inconspicuous data substitution and protects police officers from unnecessary questions when they come to seize your computer.
Enjoy ❤️👍🏻