• Configure a firewall to keep attackers out• Back up important files and recover files after a successful backup• Install updates to your operating system and other software• Password-protect the bootloaderThese same fundamental security concepts for making your desktop safe can alsoserve as a foundation for hardening your Linux servers.
After completing this tutorial, you will be able to harden your GNU/Linux desktop andprevent attacks against your computer and its data. You will be able to install andconfigure software to help protect your desktop against malware that can give anattacker access to your computer. You will also be able to use a firewall to protectagainst inbound and outbound traffic, back up and restore your data, and apply othertricks that further harden your system.
This tutorial is written for beginning GNU/Linux users. It assumes that you have abasic understanding of the GNU/Linux operating system and have experiencedownloading and installing software.
To use the examples in this tutorial, you need the GNU/Linux operating systeminstalled on a computer or as a virtual environment with root access. You also needan active Internet connection with the ability to download software.The examples use Ubuntu, so it is recommended that you use a Debian fork ofGNU/Linux. Although the examples will work on a virtual machine runningGNU/Linux, you should not use a Live CD.
Section 2. Myths about GNU/Linux security
For years, GNU/Linux users have enjoyed the notion that their operating system is