Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi Postmodern, I really your anwsers and opinions, they are logical and by observation they are true. Now back to the original question ie.; if I use a credit card or debit card to buy some thing through say Verisign, is it ok or do I have to be extra careful?
Also I was taking the normal path to become a tech, such as A+, Network+, Cisco and Mcse would all this be a waste if I wanted to go and learn Unix and Linux? Thank you Saquear!!!
Verisign is in the middle of most transactions on the Net, whether up front, with their Logo obviously showing, or in the background, as in someone else using their services, and they're as secure a transaction as you can get on the Net.
As for learning - my opinion is that anything that causes you to learn something can't be all bad, just re-direct your efforts to learning the specifics of the OS you want to use now...
As for the previous knowledge, you will find that a lot of the stuff you've already learned is the same, such as ping, tracerout, whois, find, kill, etc., that you would use on the Win command line are the same, and give the same results in Linux using the terminal.
Just concentrate on the speciific OS you're interested in from now on.... it's like learning a new language, but there's not so many words you have to remember....
PM
Last edited by Post Modern; 04-13-2005 at 12:43 PM.
Hi Postmodern, thanks for the advice and imput, always good to hear from a "tell like it is" person!!!
I know we're getting away from security but I since I have your attention I want to ask you something. I want to be good at the command line especially at troubleshooting and configuring. I guess that Broach and Backroger are also very good, so if I wanted to understand it and use it very throughly, should I start with Unix or continue with Linux?
Thank you Saquear!!!
.
.
As for me, I would think you should start with the distro that you want to use, they're pretty much the same, and at your point, I would think Unix is a backwards step.
You can always go back and get into C, C+, C++ at a later date.
Linux is actually a Minix derivitive, so go for what you need first, and then fill in the blanks....
, Hi Post Modern, thanks for the advice, and I'll take it. Can I ask you something? Is The terminal the same as "run" in windoze or is there a separate terminal for each task or folder or program? Thanks in advance for any help or advice,Saquear!!!
Originally posted by Post Modern .
Verisign is in the middle of most transactions on the Net, whether up front, with their Logo obviously showing, or in the background, as in someone else using their services, and they're as secure a transaction as you can get on the Net.
Verisign is a CA. Other than the fact that they sign certs and validate that the site is who they say are (at least, that's the theory), they have nothing what so ever to do with the security of your transaction. I can have a verisign "verified" logo, and a verisign signed SSL cert, but if I'm using 40bit SSL to talk to you, your transaction is not as secure as it could be.
Quote:
Originally posted by Saquear Hi Postmodern, I really your anwsers and opinions, they are logical and by observation they are true. Now back to the original question ie.; if I use a credit card or debit card to buy some thing through say Verisign, is it ok or do I have to be extra careful?
You have to be extra careful ... When people steal your credit card on the net, it's not from "sniffing your packets" on the wire ... Unless they have the SSL keys from the webserver you're talking to, the complete cap of the transaction is (more or less) worthless.
More often than not, when people have a credit card stolen on the net it's from something stupid. Going to the site in the email they got from bankofamerica.com and punching in their CC number, Exp date and CCV2 number, for example.
The other main way it happens is when an intruder breaks a system at the merchant's location. Once they're through the perimeter, the internal defenses are usually much lower. Soon they have the customer database of the company, which holds every credit card ever used... That's happened *many* times.
This is also why it's very important to understand that security comes in layers. Someone on the first page posted that all you have to do to secure a system is put a firewall on it ... Clearly, that person has no idea what they're talking about.
The best advice for using a credit card on the net is this:
1) Make sure you *only* provide it to secure servers (look for https:// in the addy bar)
2) Do *NOT* just click through security warnings. Read and understand them. Too many people just click "yes" or "ok" on every little window that pops up.
3) Make sure that you only use a credit card that has very good fraud protection. Do *NOT* use debit cards. Most of the time, you have no recourse for recovering your money if your debit card is stolen online.
Your a good guy. I really learned a bunch from you.
I never did trust the ____ at Microsoft. I was guessing with each new Op
system and updates it adds more sneaky stuff like this. I'm sure they can
spy on the users to the max now.
I have a question I run Mandrake 10.1 now, does it have any hidden or
temp files like this? And where are the cookies and temp internet files kept? I have Konqueror browser.
Yes, the "run" command is very similar to the "run application" command in Linux, but the terminal in Linux allows you to perform more than just one or two commands (actually, so does WinDoze, but most people don't know that).
Bring up a terminal in Linux, and type in "man --help" (without the quotes) and that will give you a small idea of what you can do with it.
You can cut CD's, run a movie, repair or replace a bad program, download and install new programs, clean out old files, delete old unused programs, update your system - the command line interface does all this and much, much more - windoze just uses little programs to do it for you, so it looks like it can do more that a Nix box.
And, you can always type in the "--help" extension if the command doesn't work for you to get some advice from your system, don't forget to put a space between the command you enter and the two dashes.
Bill:
Thanks for the vote of confidence, but I'm just another user out here trying to get by - just been here a bit longer, that's all.
I've never used Konquer, but if it's anything like Mozilla (or the latest - Firefox), you can just click on Edit> Preferences> Privacy, and delete all that stuff with a simple click - it's pretty much self-explanitory.
As it's open Source (thanks Linus and Mad Dog......) there are those of us (well, not me, per se) that can "read" the kernel, or the whole OS for that matter, and see just what's up, and what has been added or changed, and you can bet your last quarter that if something sneaky pops up, it'll be all over the Net in a few short hours - with all the great people that worked on Linux, and the thousands more that developed programs and different versions, they're not gonna' let their hard work go down the pooper just for some lame spammer or script kiddie who thinks they can get over.
PM
Last edited by Post Modern; 04-18-2005 at 11:36 AM.
PM, you really got me going on this sneeky Microsoft stuff.
I checked out those .dat files, and also did an
C:\>ATTRIB|MORE on the WINDOWS directory
I found USER.DAT and they have it as hidden and read only. If you do your edit thing to it. And page down. I see some refferences to porn sites. The funny thing is I know of no porn sites that have ever been accessed on this PC. But awhile back I we had a pop up problem. And I fdisked and deleted partitions and then redid them, and formated and reloaded everything. I wonder why just refferences to these sites are in there??????
I would really like your take on this.
Thank you much.
I really like Linux. Its like a breath of fresh air.
Oh, and I tried deleting this USER.DAT file and windows complained about a bad registery, and said it would fix it, but it just kept comming up like that. So since I saved the file I just copied it back. Very interesting isn't it?
Please don't misunderstand me, I'm not the doom and gloom guy, I've just been on the net a bit longer than most, and believe there's a few realities that most people overlook.
As for my solution to internet security - well - I'm sitting in front of a 15 system LAN that never touches the net (also using Linux to network),
That works for me.
And, for your question - now you know why I don't use Microwhatsitsname for anything......
When you "delete" the user.dat file, and restart, microwhatsitsname just regenerated the same file - the idea that it generater the same information seems to indicate the problem's not fixed.
BTW - you didn't delete the file - try changing its' perameters (IE: hidden - read only) and shutting down immediately after you do. Then start up holding down F8, and go into a "command prompt only". Do NOT go into a restart in DOS mode from inside Windows, do a fresh boot.
Once inside the dos command line, try and do a delete of the file, and then go into windows, and see what the user.dat file says - it's regenerated every time you start up.
As for the references to the porn links - try and edit them out of your registry manually - do a "find" on the url, and delete them that way.
WARNING: If you are not familiar with the registry - do not attempt anything this way.
Also - consider if the system was used when you got your hands on it, kids, your old ladies kinks, and your kids friends using the system... there are a few ways that those links can get into your system besides you - especially if it's a used system.
I like Nix too - like Steve Gibson over at www.grc.com says:
At the risk of pointing out the obvious, user.dat isn't a secret. It's a container for most of (all of?) the information in HKLU for when you log on.
It's roughly the same thing as the dotfiles on your linux machine (most of which are probably at least 75(4|5), unless you're paranoid), and not anything to get all up tight about.
I did delete that file. And the system kept rebooting all by itself.
Funny thing on this PC that has this porn on the user.dat file.
It has no \WINDOWS\TEMPOR~1\CONTENT.IE5 at all.
So I wonder whats really going on.
I'm still trying to figure where the temp files and cookies are in Linux.
The only time that PC has seen a porn site is when it had a bunch of pop ups that kept comming in.
Unless someone is doing something. The wife and her son are mormons so I doubt its them.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.