Redian新闻
>
没防火墙的话要注意什么呢?
avatar
没防火墙的话要注意什么呢?# Security - 系统安全
b*n
1
Due to the specific requirement of my project, my computer needs to directly c
onnect to the Internet, i.e. bypass the firewall of our company. I enable th
e firewall of my WinXP, but more often I work under Linux.
1) I wonder what the security precaution I should take.
2) How possible is my computer under attack? R there any ppl who r so bored to
spend time scanning my computer?
3) How is the firewall in RedHat? What kind of rules should I set?
4) I realize many router blocked ICMP, but I need
avatar
j*o
2
2cents:
1. 尽量少安装软件,没用的或者将来可能用到的软件现在就不装。
2. 安装所有软件包括操作系统的补丁和升级程序。
3. 如果不妨碍干活,还是装上防火墙或者iptable,用比较松的policy。

【在 b****n 的大作中提到】
: Due to the specific requirement of my project, my computer needs to directly c
: onnect to the Internet, i.e. bypass the firewall of our company. I enable th
: e firewall of my WinXP, but more often I work under Linux.
: 1) I wonder what the security precaution I should take.
: 2) How possible is my computer under attack? R there any ppl who r so bored to
: spend time scanning my computer?
: 3) How is the firewall in RedHat? What kind of rules should I set?
: 4) I realize many router blocked ICMP, but I need

avatar
i*r
3

小心,细心管理
if you have an real internet IP, 100% chance you will be attacked by worm/robot
iptables, you can type lokkit to configure it
For windows, you need install all patch, for Linux, it is fine.
I do not know your meanings.
There are some virus software under linux, like avp, But they only scan
windows binary, So if you not using your linux box as an mail server/file
server, forgot it.
I suggest you have an look at www.snort.org, install it under your linux box,
and you will see...

【在 b****n 的大作中提到】
: Due to the specific requirement of my project, my computer needs to directly c
: onnect to the Internet, i.e. bypass the firewall of our company. I enable th
: e firewall of my WinXP, but more often I work under Linux.
: 1) I wonder what the security precaution I should take.
: 2) How possible is my computer under attack? R there any ppl who r so bored to
: spend time scanning my computer?
: 3) How is the firewall in RedHat? What kind of rules should I set?
: 4) I realize many router blocked ICMP, but I need

相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。