More basic security.
All checks were successful
continuous-integration/laminar-elessar Build 52 succeeded in 55 seconds .

This commit is contained in:
Closebracket 2019-08-15 17:21:08 +01:00
parent 08890c90b0
commit febd3bbbcc

View file

@ -17,11 +17,18 @@
- Thread-based vs event-based servers - Thread-based vs event-based servers
## Basic Security ## Basic Security
```root``` is the administrative account of Linux systems. Owing to the extremely broad permissions granted to root accounts, one of the core tenants of Linux security is ensuring each user has their own account.
This is because root can be used, even accidentally to damage or destory the system because of its extensive permissons. Having seperate accounts, such as "yourusername" also increases accountability and decreases the likelihood of system damage.
- Creating a non-root account: - Creating a non-root account:
```adduser "yourusername" ``` ```adduser "yourusername" ```
As root, we should create a new user. This is because root has all permissions over the system and can therefore be used, even accidentally to damage or destory the system. Having seperate accounts, such as "yourusername" increases accountability and decreases the likelihood of system damage. We should create the new user as root.
Execute the command as above, replacing ```"yourusername"``` with a desired username.
During the setup, you may be asked for a password along with other information. You may customise this information as you wish. During the setup, you may be asked for a password along with other information. You may customise this information as you wish.
@ -29,6 +36,8 @@
Now that the user has been created, we should ensure that that user can execute commands with escalated permissions. These are called ```sudo``` permissons. Now that the user has been created, we should ensure that that user can execute commands with escalated permissions. These are called ```sudo``` permissons.
Execute the command as above, replacing ```"yourusername"``` with the user created in the previous step.
- The Linux security model: Knowing why you're typing your password - The Linux security model: Knowing why you're typing your password
- SSH - SSH
- Disable root login - Disable root login