[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30477 Download | Alert*

Disable WiFi or Bluetooth in BIOS Some systems that include built-in wireless support offer the ability to disable the device through the BIOS. This is system-specific; consult your hardware manual or explore the BIOS setup during boot.

Deactivate Wireless Network Interfaces Deactivating wireless network interfaces should prevent normal usage of the wireless capability. First, identify the interfaces available with the command: '$ ifconfig -a' Additionally, the following command may be used to determine whether wireless support is included for Aparticular interface, though this may not always be a clear indicator: '$ iwconfig' ...

Disable Bluetooth Service The 'bluetooth' service can be disabled with the following command: '$ sudo systemctl disable bluetooth' '$ sudo service bluetooth stop'

Disable IPv6 Networking Support Automatic Loading To disable support for ('ipv6') add the following line to '/etc/sysctl.d/ipv6.conf' (or another file in '/etc/sysctl.d'): 'net.ipv6.conf.all.disable_ipv6 = 1' This disables IPv6 on all network interfaces as other services and system functionality require the IPv6 stack loaded to work.

Ensure /var Located On Separate Partition The '/var' directory is used by daemons and other system services to store frequently-changing data. Ensure that '/var' has its own partition or logical volume at installation time, or migrate it using LVM.

Set Boot Loader Password The grub2 boot loader should have a superuser account and password protection enabled to protect boot-time settings. To do so, select a superuser account and password and add them into the appropriate grub2 configuration file(s) under '/etc/grub.d'. Since plaintext passwords are a security risk, generate a hash for the pasword by running the following command: '$ grub2-m ...

Verify /boot/grub2/grub.cfg Group Ownership The file '/boot/grub2/grub.cfg' should be group-owned by the 'root' group to prevent destruction or modification of the file. To properly set the group owner of '/boot/grub2/grub.cfg', run the command:

Ensure Software Patches Installed If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or a yum server, run the following command to install updates: '$ sudo yum update' If the system is not configured to use one of these sources, updates (in the form of RPM packages) can be manually downloaded from the Red Hat Network and installed using 'rpm'.

Verify /boot/grub2/grub.cfg User Ownership The file '/boot/grub2/grub.cfg' should be owned by the 'root' user to prevent destruction or modification of the file. To properly set the owner of '/boot/grub2/grub.cfg', run the command:

Disable Automatic Bug Reporting Tool (abrtd) The Automatic Bug Reporting Tool ('abrtd') daemon collects and reports crash data when an application crash is detected. Using a variety of plugins, abrtd can email crash reports to system administrators, log crash reports to files, or forward crash reports to a centralized issue tracking system such as RHTSupport. The 'abrtd' service can be disab ...


Pages:      Start    2997    2998    2999    3000    3001    3002    3003    3004    3005    3006    3007    3008    3009    3010    ..   3047

© SecPod Technologies