Differences between version 3 and previous revision of SecurityNotes.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 3 | Last edited on Saturday, September 14, 2002 6:47:10 pm | by JohnMcPherson | Revert |
Older page: | version 2 | Last edited on Friday, September 13, 2002 3:11:57 pm | by CraigBox | Revert |
@@ -1,11 +1,11 @@
!Passwords
Passwords are like girlfriends (or boyfriends!) - you shouldn't share them with other people, and you should get a new one every now and again.
-See ChangingPaswords
for information on creating safe, random passwords.
+See ChangingPasswords
for information on creating safe, random passwords.
A more popular method is to take the first letter of each word in a line from a song (eg 'I want to ride my bicycle' -> iwtrmb), or a phrase you can remember and changing letters to numbers ('foursquare' -> 'f0ursqu4r3')
!Basic Machine Security:
* Don't use protocols such as telnet or ftp between machines on an untrusted network such as the internet - these send usernames and passwords around in clear text. Anonymous ftp is OK - you don't give away your details. Instead look into ssh (Secure Shell). This encrypts all data between the machines.
* Don't run unnecessary services (called "daemons" in UNIX) that allow internet connections - some distributions turn these on by default. Examples are mail or news servers and printer daemon (lpd). If you want to see a list of the daemons running on your machine, at a command prompt type:%%% netstat -aAinet%%%The lines that say "LISTEN" means a daemon is waiting for connections on the specified port.