Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
How can I delete my own information from my computer of a day's work.
For example, I reckon, bash stores some "history" of commands, firefox cookies and many other programs other stuff. I want to clean it all, after ending each session, including logs. Is this even possible?
You can remove logs from /var/log/ or edit /etc/logrotate.conf to rotate your logs daily and not keep any old logs. I would advise against either option though. If you have a problem the logs can be very helpful in resolving the problem.
There's more logging at the network, system and user level. Like wit_273 already said you should not want to remove logging at the system level: not only can it hamper solving problems but for instance cleaning out wtmp (which certain crackers would do) skews your auditing. (And while you may be able to control LAN logging you certainly won't be able to control WAN logging if any.) As for the user part the Firefox approach only works with some apps. Others may store configuration and previously opened files history in one or more files and they don't necessarily need to be plaintext. Luckily the user part can easily be solved by yourself: just create a new profile then checksum it before using. After you used the account and logged out again, checksum everything again. That'll display all alterations but it's up to you to mark them as (not) suspicious.
Once paranoia sets in you might wonder why you aren't running a distro or at least the account strictly from RAM...
There's more logging at the network, system and user level. Like wit_273 already said you should not want to remove logging at the system level: not only can it hamper solving problems but for instance cleaning out wtmp (which certain crackers would do) skews your auditing. (And while you may be able to control LAN logging you certainly won't be able to control WAN logging if any.) As for the user part the Firefox approach only works with some apps. Others may store configuration and previously opened files history in one or more files and they don't necessarily need to be plaintext. Luckily the user part can easily be solved by yourself: just create a new profile then checksum it before using. After you used the account and logged out again, checksum everything again. That'll display all alterations but it's up to you to mark them as (not) suspicious.
Once paranoia sets in you might wonder why you aren't running a distro or at least the account strictly from RAM...
Can you be more specific about the "profile" stuff? Pofile for what?
I was also considering removing the writing head of a HDD ...
@SaraiKhan
Why are you so paranoid?
You can delete cookies and histories and logs from your computer, but your ISP will be logging everything you read, post or email, and there is nothing you can do about that.
your ISP will be logging everything you read, post or email, and there is nothing you can do about that.
You could use Tor for that.
But yeah, I'm with unSpawn's comment in post #5. At this level of paranoia, you shouldn't be using the HDD at all. If you don't like live CDs cuz the speed sucks, then use a ramdisk-based distro. Or like unSpawn hinted at, at least use a ramdisk for the account you are paranoid about. I'd suggest running the whole thing from RAM without swap. But if you need swap, you should definitely encrypt it with a random key each time.
I expect you could.
I am all for freedom, privacy and non-intrusion from governments.
Well, your "there is nothing you can do about that" made it sound like you weren't aware of the options available to prevent ISP snooping.
Quote:
But SaraiKhan has a linux login & password that gives him / her some reasonable security.
Why isn't that sufficient?
Only SaraiKhan could say what's sufficient for him. I would imagine that he's concerned that someone who gets their hands on the hard drive might also gain access to personal information stored on it. This is something which encryption and/or working from RAM (ie, not writing personal information to disk in the first place) can help with. The GNU/Linux username/password scheme wouldn't provide any protection at all in such a case.
win32sux is right. I do not want people gaining access to my hdd. The user/password scheme might not be sufficient for that. I considered encrypting my entire hdd, or at least the partition that root runs on. Also ... how safe is TOR?
P.S. How do I checksum the entire user profile as unSpawn mentioned?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.