mandrake 8.0 experts...how come it won't accept changes to security settings??


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers mandrake 8.0 experts...how come it won't accept changes to security settings??
# 1  
Old 10-03-2001
mandrake 8.0 experts...how come it won't accept changes to security settings??

well after a possible hack last week that was a pain in the as* i have reinstalled and i am setting up my security settings before i connect to the internet this time...

problem is that when i try to change the security setting using in the control setting the left panel (where the change is made) turns gray and the mouse pointer turns into a watch and stays like this for 20 minutes plus... i finally gave up and after reopening the security window i seems to be unchanged...

is it supposed to take more than 20 minutes?
its not like i have a slow computer??
how do i raise the security level, is there another way to change it??

thanks
# 2  
Old 10-03-2001
here is a little bit more detailed account of my problem:

in the mandrake control center under security you are given the following options:
"cracker welcom"
"low"
"medium"
"high"
"paranoid"
however when i try to choose one of these options i get the problem i described above...
# 3  
Old 10-03-2001
Hi,


Looks like there some kind of problem with your Mandrake Control Panel software.
Here are some steps to secure your Linux box:

1 Turn off unwanted services, only use telnet, finger,rsh,portmap,nfs.nis if you have to.

2 add "ALL: ALL" to /etc/hosts.deny and then add the list of tcp wrapper compiled services that you want to allow access to in /etc/hosts.allow.

3 Services that only need to listen for requests on your lan should be configured to bind to the lan nic's ip address, i.e. pop3/imap4, ssh, ftp etc, most services can be configured either via the relevant xinetd config file or the own config file.

4 If you need services to listen on your machine's internet interface turn off the service's banner or falsify it, to make it harder for a hacker.
Also ensure these services are the latest versions, to prevent against any security vulnerablilities.

5 You could also recompile your kernel with the ip personality module, this allows your machine to look like it's running another OS when scanned, i.e. Amiga, Windows 2000, etc, this should confuse any potential hackers.

6 Setup a firewall with a DENY all default policy, only allow required services in and out of the firewall.

7 Don't use the same passwords for internet sites and your system.

If you have any other questions don't hesitate to ask, myself and the other members of unix.com will do our best to help you.


Andy H Smilie
 
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

nawk won't accept comma as delimiter

I have a text file delimited by commas, with three fields (no " marks). I want to use awk to create a fourth field which is equal to the line number + field 1 + .txt I've searched this forum and found the following nawk -v OFS=';' '{print $0, FNR}' myFile Which I've amended to change the... (2 Replies)
Discussion started by: b.hamilton
2 Replies

2. Solaris

Solaris 10 install won't accept IP address

Hi I am trying to debug an issue with an automated install I have set-up. So to start I just ran a simple ok; boot cdrom - install but when it came to the IP address field it would only take the following format 123.123.123.12 and would not let me enter the last digit Anybody got any... (9 Replies)
Discussion started by: eeisken
9 Replies

3. UNIX for Advanced & Expert Users

rcp won't accept a destination with spaces...

Hello I'm on Tru64 unix 5.1.a I'm trying to execute rcp command like this rcp testfile "user@host.com:/pub/Sales/Sales Reports" and I'm getting an error message rcp: ambiguous target copy works fine if I just put underscore in the destination directory, like Sales_Reports... ... (3 Replies)
Discussion started by: Trusevich
3 Replies

4. Windows & DOS: Issues & Discussions

Stanford security experts unveil defenses against ‘phishing’ attacks

It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords. To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies

5. UNIX Desktop Questions & Answers

SuSE 8.0...I can't get SaX2 to start on Hercules 128 and YaST2 won't set up X either.

I'm trying to set up a school Linux computer and use Samba to link it to Windows NT. Pentium-133 Hercules 8 meg Stingray 128/3D I'm not too familiar with SuSE's config tools (more used to Mandrake) and so am having some trouble configuring X. SaX2 just won't start, even when I use "sax2... (1 Reply)
Discussion started by: HumanBeanDip
1 Replies

6. UNIX for Dummies Questions & Answers

Backup Exec agent won't start... PLEASE HELP!

Backup Exec Agent won't start.... Question: Has anyone had any previous experience working with Backup exec for Unix? I'm running SCO Openserver 5.0.5 and Backup Exec agent Version 5.01 Revision 5.032 Basically, these are the commands I'm issueing and here is the output. # cd etc # cd... (1 Reply)
Discussion started by: PatMcCoy
1 Replies

7. UNIX for Dummies Questions & Answers

Mandrake Linux Settings

I use Unix at work, and thought that I should finally install it on my computer, just as a play around. Plus I am into programming C and various other languages. I have never used Mandrake linux, and to be honest it was just a freebie that I found that I thought I would give a quick try. I have... (3 Replies)
Discussion started by: SiE
3 Replies

8. UNIX for Dummies Questions & Answers

Here's the fix for the SiS 7012/7018 sound problem in Mandrake 8.2

Edit your /etc/modules.conf file to either remove or comment out the two lines : alias sound-slot-0 snd-card-intel8x0 above snd-card-intel8x0 snd-pcm-oss ...and replace them with the following line: alias sound i810_audio ....viola! After saving and rebooting, now I gots da sound!... (0 Replies)
Discussion started by: DownSouthMoe
0 Replies

9. UNIX for Dummies Questions & Answers

Why won't my script run?

On the following script that I get an error when I try to execute as root: #./mv_log.sh bash: /root/util/mv_log.sh: Permission denied #!/usr/bin datetag=`date --date='1 day ago' +"%b%d%Y"` logname=`find /opt/bea/wlserver6.1/config/*/logs/ -iname 'access.log0*' -mtime -1 -print` mv... (4 Replies)
Discussion started by: darthur
4 Replies

10. Shell Programming and Scripting

Clearify what it means under 'WHAT' when hit the 'w'-command

I wonder how I shall read the result below, especially 'what' shown below. The result was shown when I entered 'w'. E.g what is TOP? What is gosh ( what does selmgr mean?)? login@ idle JCPU PCPU what 6:15am 7:04 39 39 TOP 6:34am 6:45 45 45 TOP 6:41am ... (1 Reply)
Discussion started by: Aelgen
1 Replies
Login or Register to Ask a Question