How To Secure Linux From Automated Attacks?
Linux servers used around the world dominantly in internet. They are used as web server, file server, application server etc. Being on internet creates som risk for these systems. There are different risks on the internet. One of them is automated attackers who uses scripts and tool in a automated fashion. Linux systems should be protected this type of attackers too. Here I will provide some tips about protecting our system from these attacks.
Chose and Use Strong Passwords
Passwords are generally main method to authenticate into Linux system. We should chose passwords those are unique like q34w3+Tsef34 which is not used before any where in the world. Do not use passwords like 123456 which is known all ready by attacker.
Disable Unused Services and Ports
Unused ports provides extra risk to us. If a vulnerability is disclosed about the telnet service we do not use it will be very frustrating for us.
Disable Root Logins
Using normal user with unique name login to the Linux system and than get root privilege is more safer.
Automatic System Update
Vulnerabilities disclosed every second. How can we track if our system has a vulnerable package? It is hard to track in real time. But attacks occur in real time. So setup system update automatic.
Change Default Port Numbers
Change default port numbers used by only you for management. For example we can change ssh port from 22 to 65534 to hide it some of the attackers.
Change Default Passwords
After setup and installation there will be some default passwords and users. Change them right now 🙂