Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (11): 50-52    DOI:
Current Issue | Archive | Adv Search |
The Security of Linux Server Deployment
Shen Lixiang
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper briefly introduces the Linux system, and puts forward some specific measures to solve the security of the server. It includes five aspects: user rights configuration, system service configuration, firewall configuration, system optimization and log management. In the user configuration, the order strategies of user, password, logout and permissions are proposed; in the service configuration, the solutions of the motherboard, Bluetooth, network interface and storage are put forward; it is proposed that the firewall should be kept open; in the system optimization, the optimization strategies of the swap partition, management interface network and IP logo are proposed; it puts forward a series of commands in the log management. It is hoped that the Linux server security and deployment discussed in this paper can provide reference for practical operation.
Key wordsLinux server      security      firewall      system optimization     
Published: 14 November 2017
:  TP393.08  
  TP316.81  

Cite this article:

Shen Lixiang. The Security of Linux Server Deployment. Computer & Telecommunication, 2016, 1(11): 50-52.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I11/50

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[4] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[5] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[6] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[7] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[8] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[9] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[10] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[11] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[12] GONG Jian-feng.
Research on Cloud Security Evaluation Model Based on Data Mining
[J]. 电脑与电信, 2021, 1(11): 95-.
[13] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[14] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[15] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd