How to Secure a Computer: Linux
Note: These procedures are designed for system administrators.
Linux comes in many different flavors. We will address the common elements among them. For local variations, consult your manual.
1. Assign secure password to all accounts.
Passwords are your first, best, line of defense in protecting any computer system. Select a secure password on all accounts, especially the superuser (AKA root and uid 0) accounts. Memorize these passwords. Do not write them down.
2. Use shadow password files and, when possible,
Most default installs use shadow tables. If the installation process asks whether or not to use them, select USE. If you are prompted to choose an encryption scheme of either 3DES (triple-DES) or MD5, select MD5 as it is the more difficult to crack.
3. Use ssh and sftp.
The ssh and sftp protocols encrypt the traffic that is transmitted across the network. Telnet and regular ftp do not.
4. Use the built-in firewall or the iptables
or ipchains utilities.
These utilities help track and lock down network traffic into your machine.
5. Automated patch downloading and installation should be installed if available in your Linux distribution.
6. Keep up to date with security patches:
7. Read and understand the Linux security documentation. Some helpful information can be found at the following sites: