LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 03-07-2006, 08:10 PM   #1
kimiey1
LQ Newbie
 
Registered: Mar 2006
Posts: 2

Rep: Reputation: 0
normaly hack linux system


Hi, i use linux debian, and i want to know, what folder normaly outsite user hack my linux system, because i want to block my several folder and worries I block wrong system folder..
 
Old 03-07-2006, 08:57 PM   #2
perfect_circle
Senior Member
 
Registered: Oct 2004
Location: Athens, Greece
Distribution: Slackware, arch
Posts: 1,783

Rep: Reputation: 53
Hi and Welcome to LQ forums

the LQ Forum rules oblige the users to speak english ...

Quote:
All posts should be in English. This allows our moderators to spot potentially malicious material.
 
Old 03-07-2006, 09:14 PM   #3
dr_zayus69
Member
 
Registered: Sep 2004
Location: western massachusetts
Distribution: fedora core 3, Suse 10
Posts: 877

Rep: Reputation: 35
a hacker isn't going to necessarily hack your computer to steal files. They may want to hack it to use it as a slave in a botnet to launch attacks from. There is no folder i can think fo that you should give priority, you should secure your system overall by using good passwords, etc. But if you have any files that are for work or have sensitive data in them i'd encrypt those files. good luck.
 
Old 03-07-2006, 11:42 PM   #4
pixellany
LQ Veteran
 
Registered: Nov 2005
Location: Annapolis, MD
Distribution: Mint
Posts: 17,809

Rep: Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743
Quote:
Originally Posted by perfect_circle
Hi and Welcome to LQ forums

the LQ Forum rules oblige the users to speak english ...
Huh???--OP certainly looks like English to me. I suspect he/she is ESL, so lets give a break....
 
Old 03-08-2006, 12:20 AM   #5
kimiey1
LQ Newbie
 
Registered: Mar 2006
Posts: 2

Original Poster
Rep: Reputation: 0
sorry OP, because my english no very power full.. but i tried my best...
 
Old 03-08-2006, 09:39 AM   #6
dr_zayus69
Member
 
Registered: Sep 2004
Location: western massachusetts
Distribution: fedora core 3, Suse 10
Posts: 877

Rep: Reputation: 35
by OP i believe he means original poster. So that would be you.
 
Old 03-08-2006, 10:01 AM   #7
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 11,201
Blog Entries: 4

Rep: Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123Reputation: 4123
I think your English is excellent ... especially compared to any attempt I might make to speak in your native language.

Meanwhile ...

The single most important tool that you have in defending against "hackers" (and this is true in Linux or Windows, although it's not used enough there) is the concept of user-ids and privileges. You need to:
  • Know which user-ids exist on your system, and why they are there. (Many systems come with more user-ids than you actually use, and some of those might be enabled for log-in.)
  • Use the computer, on an ordinary daily basis, from a user-id that is not an Administrator.
In order for a hacker to "break in," he must cause a program to be run on your computer, from some account that has "super-user" privileges. The programs he wants to run are those that do nasty, system-wide things, but "ordinary" user-ids are not allowed to do such things. And that is what you want. The easiest way that a hacker has to introduce a rogue program into your machine is to trick you, or someone, into running it. But, if your account is non-privileged, the rogue program .. fails. And that is what you want.

Windows actually gets a bad reputation for just one reason: most people are running it from an Administrator account, with no passwords. They have never even been told about them, much less why they should use them. Consequently, the nasty folks slip a rogue-program to them, and the program executes without question...
Quote:
Rogue: "Computer, shoot yourself in the foot!"
Computer: "Yes, master..." (Ka-blam!
Anything that a privileged user (or any program executing with such privileges) tells the machine to do, no matter how nonsensical or destructive, will be done, without question, by the computer!
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
portmap - is someone trying to hack my system? edg Linux - Security 2 07-01-2005 12:14 PM
Windows XP System Backup Hack? ta0kira Linux - Software 1 05-18-2005 08:00 AM
What OS do MMORPG servers normaly run? docbrazen General 6 01-11-2004 04:18 PM
Doesn't shutdown normaly !!! Anmar Linux - Newbie 16 09-10-2003 05:08 AM
Recovery from System Hack bselzler Linux - Security 13 02-27-2002 11:26 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 04:26 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration