{"id":10520,"date":"2019-09-20T18:30:09","date_gmt":"2019-09-20T13:00:09","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=10520"},"modified":"2024-03-19T15:13:48","modified_gmt":"2024-03-19T09:43:48","slug":"how-to-secure-and-speed-up-your-linux-os-pc","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/how-to-secure-and-speed-up-your-linux-os-pc\/","title":{"rendered":"How to Secure and Speed Up Your Linux OS PC"},"content":{"rendered":"<p>Linux is considered one of the lightest and most secure operating systems that guarantee the privacy and smooth and unforgettable user experience. Unlike Windows, which is prone to bugs when updating and upgrading and security weaknesses, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux\" target=\"_blank\" rel=\"noopener\">Linux<\/a> is a stable and reliable system. LEt\u2019s have a look at how you can further secure your PC on Linux and how to run it smoothly.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Maintain Security Updates<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>With each passing day,\u00a0 more and more companies are falling prey to security breaches and severe malware attacks. The implications of security breaches and malware infection are dire, costing millions of dollars in lawsuits and ensure business continuity. for this reason, it&#8217;s always recommended to always keep your system up to date with the latest software patches and security updates to seal any loopholes or weaknesses that attackers might use to infiltrate your system.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Close Non-Essential Services<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>If you have non-essential startup programs, then you might have to disable them.\u00a0 This is because many non-essential startup programs exert pressure on RAM and CPU causing the PC to start slowing down or freezing when opening other applications. By closing these applications, you free up the RAM and ensure that other applications can run smoothly.<\/p>\n<p><strong>Related:<\/strong> &#8211;<a href=\"https:\/\/www.the-next-tech.com\/security\/cyber-security-its-time-you-protect-your-network\/\">\u00a0Cyber Security \u2013 It\u2019s Time You Protect Your Network<\/a><\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Root Access Not For Everyone<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"alignright wp-image-8893\" src=\"https:\/\/media.giphy.com\/media\/tbolNliT5ePG8\/source.gif\" alt=\"\" width=\"397\" height=\"264\" \/>Usually, regular users are limited to the Linux commands they can run on a Linux system &#8211; and it\u2019s for a good reason &#8211; to avoid running administrator commands, some of which can cause serious problems which can lead to deletion of configuration files, or even crushing of the entire system. To avoid this, always be mindful of the users who have root privileges, commonly known as sudo privileges. Also, it\u2019s prudent to limit what each sudo user can do and delegate very important tasks to the systems administrator.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Avoid Auto-Mounting Devices<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>If your system is accessible to the public, make sure that right use the customization feature under Users and Groups and disable the auto-mounting feature. To avoid a scenario where anybody can walk into a room and plug in an external drive, go to System \u2013 Administration \u2013 Users and Groups \u2013 Select the User \u2013 Advanced Settings \u2013 User Privilege tab. Once there uncheck the box relating to the Access External Storage Devices Automatically, Use CD ROM Drives, and Mount Userspace Filesystems.<\/p>\n<p>With Linux distros, there is an option of disabling file sharing over the network and restricting users to enter passwords before connecting to a Network service.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Avoid Upgrading as Soon as a New Distros Checks in<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Linux Distributions come into the market every six months. However, for Debian lovers, a stable release comes every two years. Ubuntu desktop releases come with three-year support while a corresponding server version gets five-year support.<\/p>\n<p>If security and a stable system are all that you think of, then install one of the Long Term Support (LTS) distributions to always, avoid the desire to upgrade.<\/p>\n<p><strong>Related:<\/strong> &#8211;\u00a0<a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/how-artificial-intelligence-is-changing-cybersecurity\/\">How Artificial Intelligence is Changing Cybersecurity<\/a><\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Using Firewalls and Encryption<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>A firewall is a crucial component of any operating system &#8211; Linux included. It\u2019s responsible for traffic and packet filtering, ensuring that only the required packets and traffic is allowed in and out for the system. It\u2019s always recommended that during the setup of a Linux system, the firewall is enabled and only the required services are allowed through.<\/p>\n<p><strong>Related:<\/strong> &#8211;\u00a0<a href=\"https:\/\/www.the-next-tech.com\/top-10\/top-10-best-hacking-books-will-help-for-every-hacker\/\">Top 10 Best Hacking Books Will Help for Every Hacker<\/a><\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Encrypting the File System<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>User passwords may not guarantee hackers from reading your files neither will the use of passwords. To keep the superuser from accessing the contents of your home directory, encrypt your data to keep it off prying eyes. You can use the href=&#8221;https:\/\/en.wikipedia.org\/wiki\/TrueCrypt&#8221;&gt;TrueCrypt app that uses a section of the Linux partition as an independent system.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-10522 size-full\" src=\"https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2019\/09\/19184843\/truecrypt-wizard.png\" alt=\"Encrypting the File System\" width=\"718\" height=\"461\" srcset=\"https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2019\/09\/19184843\/truecrypt-wizard.png 718w, https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2019\/09\/19184843\/truecrypt-wizard-300x193.png 300w, https:\/\/s3.amazonaws.com\/static.the-next-tech.com\/wp-content\/uploads\/2019\/09\/19184843\/truecrypt-wizard-27x17.png 27w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/p>\n<p>TrueCrypt is not available on the repository, but you can download and install it from its Tar archive. Make sure you have a Fuse library and an appropriate device-mapper tool.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h3><strong>Delete Files and Browse Anonymously<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Formatting your hard disk only tells the system to forget where the files are. Those familiar with Linux commands use the rm command to clean up their devices.\u00a0 That is why with the Shred command, you can overwrite the disk space and make sure nothing remains.<\/p>\n<p>Using the shred command may take longer because it overwrites one location twenty-five times. If you are comfortable with the time it takes, use the \u2013n switch to determine the number of times to overwrite. For example:<\/p>\n<blockquote><p><em>$ shred \u2013remove \u2013n \u2013v FileName<\/em><\/p><\/blockquote>\n<h4><strong>Conclusion<\/strong><\/h4>\n<p>As we wrap up, the responsibility of securing a Computer system mostly lies with the end-user. The end-user, therefore, should have all the basic security measures at their fingertips such as implementing a firewall, use of strong passwords and applying encryption. It also important to add that failure to implement these measures can lead to a system compromise which can prove costly when the theft of personal and financial data happens.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux is considered one of the lightest and most secure operating systems that guarantee the privacy and smooth and unforgettable<\/p>\n","protected":false},"author":329,"featured_media":10537,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/10520"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/329"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=10520"}],"version-history":[{"count":7,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/10520\/revisions"}],"predecessor-version":[{"id":77866,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/10520\/revisions\/77866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/10537"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=10520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=10520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=10520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}