Jump to content

skiller

Member
  • Posts

    95
  • Joined

  • Last visited

Posts posted by skiller

  1. You both guys are exactly right.

    I did not write this to open a discussion how to make a linux server safe. Of cource there are many things, like login only from a specific IP, RSA kyes for SSH, and, and.....

    Which kind of answer are you getting, if you ask a linux newbie for iptables?

    Please do not missunderstand my post. I said this is the basic.....

    Cheers

    Michael

  2. All hack attacks and other rubbish, etc. were we all getting, is from Linux users with an unsafe system. The hacker assume the Linux machine and the owner of the machine

    do not realize that. That is the funny thing why we all get attacks.

    I am writing here a how to what you have to do first after you finished your Linux installation. This is basic and the first thing what you have to do.

    It is easy to understand and for beginners it takes arround 20 minutes. My favourite distri is Debain. I am not using Linux for desktop. I read many posts and saw

    many users are using it as a desktop. This guys should follow up this how to, when they have access from the WAN via SSH or Telnet to the local machine.

    1. Create a new user, it could be a name and follwed with some digits.

    2. Choose a strong password with special charkters like +=% If you choose passwords like: passw0rd or other simple names, you get hacked straight away.

    3. Add this new user into the file /etc/sudoers

    vi /etc/sudoers

    Look for "User privilege specification" below the user "root" you write

    Your_new_username ALL=(ALL) ALL

    4. Now we change the standard SSH port 22 to another port, I am using the birthday from my wife: 2412

    edit the file /etc/ssh/sshd_config

    vi /etc/ssh/sshd_config

    Please check your firewall settings before you do that, the Port 2412 TCP must be open

    Restart the SSH daemon

    /etc/init.d/sshd restart

    5. Now try and login with your new user and choose the new SSH port

    If you are in with your new user, you need to have root permission´s

    sudo su -

    Enter the PW from the new user. Now you have root permissions!

    6. Edit again the file /etc/ssh/sshd_config and look for # Authentication

    vi /etc/ssh/sshd_config

    Change the PermitRootLogin to:

    PermitRootLogin no

    Restart the SSH daemon

    /etc/init.d/sshd restart

    root is a known user on each Linux machine, with PermitRootLogin no we have diabled the user root and it is more secure.

    There are many other things to make Linux safe. I am using on my server´s fail2ban too.

    I have in my mind this is the basic for everybody and easy to undestand.

    Comments are almost welcome....

    Cheers

    Michael

  3. Just want to share my VoIP experinece with a VoIp client for the Iphone. I got it from the app store, is called

    wi-fone I have added my German Voip provider and make all my international calls with it. It saves

    me a lot of money. I could not test it via 3g, cause I am using AIM, they provide only Edge and it is too

    slow.

    Cheers

    Michael

×
×
  • Create New...