In this video, learn how to disable Ctrl-Alt-Delete.
- [Instructor] Typically, when you press Ctrl + Alt + Del…all at the same time, your Linux system initiates a reboot.…If an attacker could get access…to the keyboard of the system,…then they could initiate a reboot.…That would allow them to boot into single user mode…or bypass init, for example.…It's practically like having access to the power button.…So, in what cases would someone have access…to the keyboard of a machine, but not the power button?…The most common case would be a remote console of some sort.…Some hardware vendors provide this capability…where you can connect over the network to the remote console…and type commands into the computer…just like you had plugged a keyboard into it.…
Many of those have virtual power buttons as well.…There are some remote consoles that are really KVM devices.…KVM, of course, stands for keyboard video and mouse.…If an attacker gain access to the network KVM,…then they could send keystrokes to your system.…They wouldn't have access to the power button,…but they could send a Ctrl + Alt + Del sequence.…
Author
Released
6/11/2018- What makes Linux secure?
- Physical security concepts
- Encrypting new and existing devices
- Account and network security
- Linux firewall fundamentals
- File system security
- File and directory permissions
- ACLs and rootkits
Skill Level Intermediate
Duration
Views
Related Courses
-
Linux: Bash Shell and Scripts
with Kevin Dankwardt2h 46m Intermediate -
Building an Ubuntu Home Server
with Scott Simpson2h 16m Beginner
-
Introduction
-
Welcome1m 25s
-
-
1. General Security
-
General security1m 9s
-
Is Linux secure?2m 26s
-
What makes Linux secure?8m 18s
-
-
2. Physical Security
-
Physical security concepts7m 41s
-
Single user mode security6m 45s
-
Secure the bootloader6m 57s
-
Disk encryption5m 34s
-
Encrypt a new device: Part 18m 38s
-
Encrypt a new device: Part 24m 17s
-
Disable Control-Alt-Delete1m 44s
-
3. Account Security
-
Account security45s
-
Introduction to PAM5m 13s
-
Password security7m 58s
-
Control account access5m 6s
-
Security by account type6m 1s
-
Account security: Demo 22m 44s
-
-
4. Network Security
-
Network security35s
-
Network security: Part 17m 54s
-
Network security: Part 26m 20s
-
Secure SSHD: Part 17m 52s
-
Secure SSHD: Part 23m 15s
-
Linux firewall fundamentals7m 36s
-
Firewall rule specifications4m 43s
-
Example firewall rules3m 59s
-
Linux firewall demo9m 47s
-
TCP Wrappers: Part 17m 2s
-
TCP Wrappers: Part 24m 2s
-
-
5. File System Security
-
File system security1m 2s
-
Special modes: Part 17m 55s
-
Special modes: Part 23m 4s
-
File attributes6m 5s
-
File attributes demo2m 48s
-
ACLs9m 25s
-
ACLs demo6m 13s
-
Rootkits8m 33s
-
Rootkit hunter demo7m 12s
-
-
Conclusion
-
Summary4m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Disable Control-Alt-Delete