website diff en/doc/handbook/security.html @ rev 124
en: Tidy up Tazwok Manual & typos
author | Paul Issott <paul@slitaz.org> |
---|---|
date | Sat Jul 26 20:47:49 2008 +0000 (2008-07-26) |
parents | f0c0c73578c0 |
children | ff73e55e9dd5 |
line diff
1.1 --- a/en/doc/handbook/security.html Sat Jun 14 14:48:17 2008 +0000 1.2 +++ b/en/doc/handbook/security.html Sat Jul 26 20:47:49 2008 +0000 1.3 @@ -6,7 +6,7 @@ 1.4 <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /> 1.5 <meta name="description" content="slitaz English handbook" /> 1.6 <meta name="expires" content="never" /> 1.7 - <meta name="modified" content="2008-02-26 18:30:00" /> 1.8 + <meta name="modified" content="2008-07-18 05:30:00" /> 1.9 <meta name="publisher" content="www.slitaz.org" /> 1.10 <meta name="author" content="Christophe Lincoln" /> 1.11 <link rel="shortcut icon" href="favicon.ico" /> 1.12 @@ -30,9 +30,9 @@ 1.13 <h2><font color="#df8f06">SliTaz and System Security</font></h2> 1.14 1.15 <ul> 1.16 - <li><a href="#policy">Security Policy</a></li> 1.17 + <li><a href="#policy">Security Policy.</a></li> 1.18 <li><a href="#root">Root</a> - The system administrator.</li> 1.19 - <li><a href="#passwords">Passwords</a></li> 1.20 + <li><a href="#passwords">Passwords.</a></li> 1.21 <li><a href="#busybox">Busybox</a> - Configuration file /etc/busybox.conf.</li> 1.22 <li><a href="#web-server">LightTPD web server</a> - Disable the LightTPD web server.</li> 1.23 <li><a href="#ssh">SSH server</a> - Default options.</li> 1.24 @@ -44,7 +44,7 @@ 1.25 <a name="policy"></a> 1.26 <h3>Security Policy</h3> 1.27 <p> 1.28 -SliTaz has given a lot of consideration to system security. Applications are tested for many months before being 1.29 +SliTaz has given a lot of consideration to system security. Applications are tested for many months before being 1.30 included in the distribution. At boot time, a minimum of services are launched by the rc scripts. For a complete 1.31 lists of daemons enabled, you can look in the <code>RUN_DAEMONS</code> variable in the <code>/etc/rcS.conf</code> configuration 1.32 file: 1.33 @@ -62,11 +62,11 @@ 1.34 <a name="root"></a> 1.35 <h3>Root - The system administrator</h3> 1.36 <p> 1.37 -In a GNU/Linux system, the <em>root</em> user is the system administrator, <em>root</em> has all the rights 1.38 +In a GNU/Linux system, the <em>root</em> user is the system administrator. <em>root</em> has all the rights 1.39 to the system files and that of the users. It is advisable never to log in as <em>root</em> by using the command 1.40 -<code>su</code> followed by the password to obtain absolute rights over the system. Never log in as <em>root</em> and surf the 1.41 -internet for example, this allows you to create a double barrier in the case of an attack or intrusion after a 1.42 -download. This makes it harder for a <em>cracker</em> to take control of your machine - first he must crack your 1.43 +<code>su</code> followed by the password to obtain absolute rights over the system. Never log in as <em>root</em> and surf the 1.44 +internet for example. This allows you to create a double barrier in the case of an attack or intrusion after a 1.45 +download and makes it harder for a <em>cracker</em> to take control of your machine - first he must crack your 1.46 password and then crack the <em>root</em> password of the system administrator. 1.47 </p> 1.48 <p> 1.49 @@ -102,7 +102,7 @@ 1.50 environment, you can safely disable it by removing it from the <code>RUN_DAEMONS</code> variable in the 1.51 <code>/etc/rcS.conf</code> configuration file or to stop it manually: 1.52 </p> 1.53 -<pre> # etc/init.d/lighttpd stop 1.54 +<pre> # /etc/init.d/lighttpd stop 1.55 </pre> 1.56 1.57 <a name="ssh"></a> 1.58 @@ -117,7 +117,7 @@ 1.59 <pre> # /etc/init.d/dropbear start 1.60 </pre> 1.61 <p> 1.62 -By default Dropbear is launched with the following options: 1.63 +By default, Dropbear is launched with the following options: 1.64 </p> 1.65 <pre class="script"> -w Disallow root logins. 1.66 -g Disallow logins for root password. 1.67 @@ -130,7 +130,7 @@ 1.68 <a name="pscan"></a> 1.69 <h3>Pscan - Ports scanner</h3> 1.70 <p> 1.71 -Pscan is a small utility of the Busybox project, it scans the ports of your machine. You can use 1.72 +Pscan is a small utility of the Busybox project that scans the ports of your machine. You can use 1.73 <code>pscan</code> to scan the localhost or a remote host using the name or IP address of the machine. 1.74 Pscan will test all the ports from 1 - 1024 by default and list those that are open, their protocol 1.75 and associated service (ssh, www, etc):