7 ways to Secure Operating System that you Need To Learn Now
whatever platform you use, There are some things that the main security system that applies to all operating systems
Some operating systems must be tightened because their design characteristics produce a less than optimal security profile and some operating systems use the root / administrator to improve security & protection.
security This should be kept in mind at the time of securing the operating system, even if using a copyright operating system such as Microsoft Windows and Apple Mac OS X or open source systems such as Linux, FreeBSD, NetBSD, or even OpenBSD.
Very rarely the default operating system installation is adequate, without further protection. Start with the following things, whatever your operating system is and then do more security according to the needs and vulnerabilities of your platform. Do not let your system security integrity fall apart.
Use Strong Password
One of the easiest ways to increase security is to use passwords that are not easily guessed by brutal attacks.
A brutal (or so-called bruteforce) involuntary attack is where the attack uses an automated system to guess passwords as quickly as possible, in the hope of getting the correct password in the not-too-distant future.
Passwords consisting of special characters and spaces, numbers, and uppercase letters - plus avoiding the word in a shirt - are much more difficult to guess than your parents' name or date of birth.
Do not forget that adding a long password with one character alone will increase the number of possibilities that must be guessed.
In general, passwords of less than eight characters are considered too easy to guess. Ten, 12, or even 16 is better. However, do not make it too long so it's hard to remember or hard to type.
buy outside protection
It does not hurt to use an external firewall / router to help protect your computer, even if you only have one computer.
At the low-end level, you can buy retail router devices, such as Linksys, D-Link, and Netgear that are widely available in various computer stores.
the more expert you can buy manageable switches, routers, and firewalls and enterprise-class vendors, such as Cisco, Vyatta, and Foundry Networks.
From the middle to upper level, you can install a firewall by configuring from the base or using a firewall / router installer package, such as m0n0wall and IPCop.
Proxy servers, antivirus gateways, and spam filtering gateways, they can all also strengthen security better than hubs, NAT routers are better than switches, and firewalls are definitely a must.
Update Your Operating System
operating system Ignoring security updates for too long can make your computer an easy target for hackers. Do not let the software installed on your computer for too long not update.
This also applies to malware protection software, such as antivirus applications, because the level of protection will be more effective if kept up-to-date than if using existing malware signature definitions.
Turn off unnecessary services
Make sure you know every service that runs on your computer and has a reason to run.
You need to know the impact of the service and not to turn off the service that matters. However, it's good not to run the right service-bear you do not use.
The importance of encrypting communications
The use of cryptographic systems to protect communications from "the eavesdroppers" is familiar.
Software that supports Open PGP for e-mail, Off The Record plug-ins for IM clients, tunnel encryption using SSH and SSL for ongoing communication, and many other tools that keep your data safe on the go.
monitor threats and security break-ins
monitoring regularly can find out what is suspicious and take action on something that looks like a security breach or a threat to security.
You should not only monitor the network, but also monitor local system security.
data protection with backup data protection
To backup data can be started from the most basic and simple way of copying CDs periodically, up to a high level, ie automatically backups on the server (cloud).
On systems that have to keep running without shutting down the service, RAID can provide redundancy in case of hard disk failure. Free backup tools, such as rsync and Bacula, can back up automatically.
Control systems such as Subversion, have flexible data management so you can not only backup to other computers, but you can also update multiple desktops or laptops with the same data without any significant difficulties.