Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I did the Quick Test and the Trojan test. Here's what they said. (I've omitted the warning about browser referrals; you need to run a proxy to stop those.)
Check for vulnerabilities of your computer system to remote attacks
We have scanned your system for open ports and for ports visible to others on the Internet. As a rule an open port means your computer is vulnerable to attacks by crackers. They gain access to your computer and its files through these open ports.
The test found visible port(s) on your system: 21, 23, 80, 135, 137, 138, 139, 1080, 3128
Install personal firewall software. If you have already installed and are using a firewall, check if it is set to make all the ports of your computer invisible (hidden). If it is, then get new firewall software and redo this test.
Trojan horse check
The test scanned your system to find signs of a Trojan. If a Trojan horse is on your computer a cracker can access your system's files and your personal data.
The test found visible ports on your system: 27374, 12345, 1243, 31337, 12348.
The following Trojans use these ports: SubSeven, NetBus, SubSeven, Back Orifice, BioNet
Although these ports are visible, they are not open, so your system is not infected. However, having visible ports on your system means your computer can be "seen" over the Internet. This makes it very easy for skillful intruders to explore your system.
Install personal firewall software and use an anti-Trojan program. If you have a firewall, check if it is set to make all your computer ports invisible (hidden). If it is, then it failed miserably. Replace it and redo this test.
- - - - - - - - - -
The results of Stealth Test
We have sent following packets to TCP:1 port of your machine:
Here is the description of possible results on each sent packet:
"Stealthed" - Means that your system (firewall) has successfuly passed the test by not responding to the packet we have sent to it.
"Non-stealthed" - Means that your system (firewall) responded to the packet we have sent to it. What is more important, is that it also means that your computer is visible to others on the Internet that can be potentially dangerous.
Packet' type Status
TCP "ping" non-stealthed
TCP NULL non-stealthed
TCP FIN non-stealthed
TCP XMAS non-stealthed
However your Knoppix is read only, if you got windows on the HD that would be writable and easy to manipulate.
There are two thing you could do: turn an old box into a firewall and place it between your computer and the internet.
Or if you're happy with knoppix, install it on your harddisk, download a firewall and install it.
After all running Knoppix from CD is only for testing, recovery of other Linux distro's, or giving "new" linuxers a look and feel of what Linux is like.
Installing on HD makes it run faster too ( reading CD's is slower than reading HD's ).
You can also download another distro, most of them have a firewall in their packages, but all other distro's need a HD install too.
I've done all the PC Flank tests and my machine passed all their tests with good results ( stealthed ), but then I have a good firewall running.
PS: PC Flank is the best test-site there is, you could also try GRC: https://grc.com/x/ne.dll?bh0bkyd2
but they are more focused on windows machines and the results from them are not to be trusted by Linux users.
onurb> Or if you're happy with knoppix, install it on your harddisk, download a firewall and install it. After all running Knoppix from CD is only for testing, recovery of other Linux distro's, or giving "new" linuxers a look and feel of what Linux is like.
Yes, I know about the h/d-install option, which is cool.
As you mention, though, the main idea is that Knoppix can be run temporarily, from CD, without modifying the system. And that's how I want to use it. (It's especially fun for impressing friends who think Linux is lightyears behind Windows.)
But how can you use it if it leaves the system wide-open? Sure, you could always disconnect the machine from the Net first. But the Net is such a big part of computing these days. And what do you tell your friends? "Sorry we can't access the Net, but your system would be vulnerable"? Not very impressive.
onurb> I've done all the PC Flank tests and my machine passed all their tests with good results ( stealthed ), but then I have a good firewall running.
Yes, and I got the same results from my firewalled Windows. But that's the whole point.
I see that "ipchains" is included on the Knoppix CD, and that it has something to do with firewalls. I've read its HOW-TO, though, and a few webpages about it, and I'm still confused---you have to know quite a bit about networks to use it. Besides, why should basic security be so hard with a distribution that claims to automatically configure everything? I don't get it.