Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
My system is Slackware14.1 and KDE 4.10.
Now I'm in trouble, as PC is intruded when it does't connect to Network and internet.
but regrettably, I can't hide only any username and passward.
What is supposed, is through
1. wireless network.
Its demon isn't active.
2. power line communication.
I did't know entirely the way to prevent this.
Would you teach me these prevention?
In addition, I'd like to know how to stop port 6000 at KDE desktop.
Also, if it's not already installed, install fail2ban.
If you think this intrusion is coming from outside, you should be able to close down port 6000 in your router. Otherwise, you can do it in iptables. If you do not have a good frontend for iptables, I can recommend ufw; there's a Slackbuild for a KDE GUI frontend for ufw.
Frankly, if you think someone who has physical access to the machine is accessing it and you cannot hide your user name and password (is this maybe a school or company machine, rather than your personal machine?), there may be little you can do in software.
And no evidences, but in standalone, cups printing have gone to abnormal behavior, and when I use scim-anthy in Japanese input, the candidate of transformation is occasionally gone back to the default though this must be the newest. This two wrong behavior are problems.
When anyone boots my PC or shutdowns, the date-time is logged the file, therefore anyone didn't operate physically, but someone may go into my room.
Now, I installed fail2ban and kcm-ufw. Also before I use iptables firewall and so make the drop rule of port 6000, but nmap shows that 6000 is opened.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.