The security chapter is designed to give the user a very basic level of understanding of security within the GNU/Linux operating system. This chapter also has information on the UNIX system style file permissions used on most GNU/Linux machines.
There are also sites such as Linux Security. If your looking for a program to assist in locking down your operating system you may want to check Bastille Linux that runs on RPM based distributions (Redhat/Mandriva/SuSE).
If you are using grub go to the relevant line (the one with the kernel and various options) then press 'e' for edit and add “single” on to the end of the lines that boot the kernel. Then hit [Enter] and press 'b' (to boot).
This is also a basic security hazard if you have others using your computer and security is a concern, you may like to add a password to your LILO or Grub prompt to stop this from being done.
The umask is a value set by the shell. It controls the default permissions of any file created during that shell session. This information is inherited from the shell's parent and is normally set in some configuration file by the root user (in my case /etc/profile).
You can do this by doing 777 minus the file permissions you want. Note that umask works with numbers only, for an explanation please see, the Section called File Permissions
Compute an md5 checksum (128-bit) for file “file_name” to verify it's integrity. You normally use the “ md5sum -c” option to check against a given file (often with a “.asc” extention) to check whether the various files are correct, this comes in handy when downloading isos as the checking is automated for you.
This command will make a random password of length ten characters. This password generator creates passwords that are designed to be hard to guess. There are similar alternatives to this program scattered around the internet.