How To Secure Linux From Automated Attacks?

RSS
EMAIL
FACEBOOK
FACEBOOK
GOOGLE
GOOGLE
https://www.poftut.com/secure-linux-automated-attacks/
PINTEREST
PINTEREST
INSTAGRAM

Linux servers used around the world dominantly in internet. They are used as web server, file server, application server etc. Being on internet creates som risk for these systems. There are different risks on the internet. One of them is automated attackers who uses scripts and tool in a automated fashion. Linux systems should be protected this type of attackers too. Here I will provide some tips about protecting our system from these attacks.

Chose and Use Strong Passwords

Passwords are generally main method to authenticate into Linux system. We should chose passwords those are uniq like q34w3+Tsef34 which is not used before any where in the world. Do not use passwords like 123456 which is known all ready by attacker.

Disable Unused Services and Ports

Unused ports provides extra risk to us. If a vulnerability is disclosed about the telnet service we do not use it will be very frustrating for us.

Disable Root Logins

Using normal user with uniq name login to the Linux system and than get root privilege is more safer.

Automatic System Update

Vulnerabilities disclosed every second. How can we track if our system has a vulnerable package? It is hard to track in real time. But attacks occure in real time. So setup system update automatic.

Change Default Port Numbers

Change default port numbers used by only you for management. For example we can change ssh port from 22 to 65534 to hide it some of the attackers.

Change Default Passwords

After setup and installation there will be some default passwords and users. Change them right now 🙂

RSS
EMAIL
FACEBOOK
FACEBOOK
GOOGLE
GOOGLE
https://www.poftut.com/secure-linux-automated-attacks/
PINTEREST
PINTEREST
INSTAGRAM

LEARN MORE  How To Run Shell Script or Command On Remote With Ssh

Leave a Reply

Your email address will not be published.