Linux security
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Plusnet Community
- :
- Forum
- :
- Other forums
- :
- Tech Help - Software/Hardware etc
- :
- Linux security
Re: Linux security
07-08-2012 11:29 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Quote from: petertuson I also ran an intrusion detection system which flagged up all the bits of linux that enables interoperability with windows so I turned them off.
Can you provide a bit more info about the intrusion detection system or what problems might be caused by interoperability with Windows.
If it's very detailed a link to a site with this info would be helpful.
Thanks
dick:green Quote fixed
Re: Linux security
07-08-2012 5:11 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Quote from: Waldo waldo@schabziger ~ $ sudo bash
Using sudo to run bash, what kind of world is this.. Any self respecting Linux install will have the su command!
The only time I ever login as root is when a kernel update has killed the NVidia drivers and they need rebuilding or doing serious system management.
Re: Linux security
07-08-2012 5:47 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
07-08-2012 6:46 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
07-08-2012 7:58 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
I am allergic to Command Line use (or just to old to learn it!) , and so value the simple "boot to root" option in PCLinuxOS.
Am I not right in thinking that it is perfectly safe off-line?
Re: Linux security
07-08-2012 9:42 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Running as root off line would limit the ability for any malicious script/program to contact external servers but will make no difference to the damage they can cause to your system.
The main concern running X as root is usually the damage that badly coded apps or inexperienced users can cause.
Also, it wouldn't make any practical difference whether you run a full X session as root or an individual X app with root privileges, they can both cause equal amounts of damage.
And don't forget, while a malicious script or program run as a normal user can't trash your system, it can trash your user data, which is usually more important.
Re: Linux security
10-08-2012 6:44 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Quote from: Heloman https://www.grc.com/discussions.htm
Is there any particular reason why so many threads take place on grc.test?
Re: Linux security
10-08-2012 6:44 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
23-08-2012 12:09 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Something else I am curious about, still security related what do linux users do about ip filters when using Torrent apps and IP filters. I notice block list is now only for donators but you can get a tar text file. Is there some way of converting this text into something that can be used with QBtorrent? I notice that Transmission doesn't seem to have the ability to ip filter any more or I can't seem to find the edit preferences button I've been using Torrents more these days after installing Virtualbox to try a few flavours.
Ironically blocklist filters are being seeded but this is definitely not the route to go down oohh the irony. Some may say poetic justice!
Re: Linux security
23-08-2012 2:14 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
If you wanted to infect Linux, the best way would be to create a modified distro and hope that the user didn't bother to do a md5 check on the .iso file.
The best way to avoid email infection is to not follow stupid emailed instructions.
"In The Beginning Was The Word, And The Word Was Aardvark."
Re: Linux security
23-08-2012 2:18 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Not sure if clam can filter outgoing messages., I use Google for my email and it scans all messages.
transmission can use blocklists I use http://list.iblocklist.com/?list=bt_level1&fileformat=p2p&archiveformat=gz to download it. Using transgui I control it from a different pc, Or from web gui, click on the spanner and then Peers and set it up there.
Re: Linux security
24-08-2012 1:39 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
24-08-2012 2:11 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
24-08-2012 8:14 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Linux security
25-08-2012 10:07 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
The result is that the manuals are usually written by someone else, or fleshed out by someone else.
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page