Secure Your Operating System by Elee Wright

Secure Your Operating System by Elee Wright.

Framework will create an user account called ASPNET. These types of accounts are system accounts and should not be modified or deleted unless the associated software has been removed or is no longer needed. Go to the location where the file is located and right-click on it to see its properties. For Microsoft system files, a version tab should also be available, which gives a good indication of its origin. If the file is suspect, update your virus and anti-spyware definitions and scan the file. Standard Linux installations will have many services that are started with the operating system. These, in most cases, are useless for the home user. For example, the FTP service runs an ftp server that is used to transfer files to and from the PC. This is not required on home PCs as home users will be primarily downloading files. Similarly look for other entries similar to this one for telnet, finger, shell, login, talk, ntalk, and auth. Press [Ctrl] + [X] to exit pico. When prompted to save the file, press [Y] and hit [Enter]. You will now need to restart Inetd to let the changes take effect. At the command line, type killall -HUP inetd to restart inetd. On Red Hat systems, type in “cd /etc/rc.d/rc3.d” (or “rc5.d”) depending on whether you are in runlevel 3 or 5. Whether you love your computer enough to have given it a name or whether it’s someone else’s property that you just work at, you know your computer best. One thing to remember is that slow behavior could also be due to spyware, and it doesn’t necessarily mean a virus.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s