Forum › Forums › General › Tips and Tricks › My Post-installation Configurations
- This topic has 3 replies, 2 voices, and was last updated Jul 1-3:17 pm by Brian Masinick.
-
AuthorPosts
-
July 1, 2020 at 9:01 am #38407Member
macondo
Again folks, this is subjective, just the way I do things. 🙂
After installing antiX, the first thing I configure is sudo.
# visudo Put this line at the bottom of the file: <your_user_name> ALL=NOPASSWD:ALL save/exit/rebootIf you use nano,
# nano /etc/sudoers
ditto as above.
Next, aliases make my life easier,
$ nano .bash_aliases
Paste this:
alias adu="sudo apt-get update && sudo apt-get dist-upgrade" alias agi="sudo apt-get install" alias as="apt-cache search" alias ash="apt-cache show"logout/login and test it as USER:
$ adu
Go to .nanorc and type this:
set smoothUFW (Uncomplicated Firewall)
# apt-get install ufw # ufw enable # ufw status # rebootAfter coming back do another ‘ufw status’ to find out if the firewall
is working.To avoid pinging: go to:
# nano /etc/ufw/before.rules
And leave this section looking like this:
# ok icmp codes -A ufw-before-input -p icmp --icmp-type destination-unreachable -j DROP -A ufw-before-input -p icmp --icmp-type source-quench -j DROP -A ufw-before-input -p icmp --icmp-type time-exceeded -j DROP -A ufw-before-input -p icmp --icmp-type parameter-problem -j DROP -A ufw-before-input -p icmp --icmp-type echo-request -j DROPNext, go to http://www.grc.com and click on ShieldsUp, next screen scroll down to Hot
Spots, and click on ShieldsUp again, next screen click on Proceed, next screen
click on All Service Ports and let it check the ports, gives an ok result, the
ports are neon green, and gives you this veredict:“Your system has achieved a perfect “TruStealth” rating. Not a single packet —
solicited or otherwise — was received from your system as a result of our
security probing tests. Your system ignored and refused to reply to repeated
Pings (ICMP Echo Requests). From the standpoint of the passing probes of any
hacker, this machine does not exist on the Internet. Some questionable personal
security systems expose their users by attempting to “counter-probe the prober”,
thus revealing themselves. But your system wisely remained silent in every way.
Very nice.”Startup
To start your apps and window manager: go to .xinitrc as USER,$ nano .xinitrc
Put this:
#!/bin/sh setxkbmap -option terminate:ctrl_alt_bksp xsetroot -solid black unclutter -idle 2 & numlockx & exec window managerI think this is about it, thanks for your patience.
Happy trails,
macondoantiX Core 64 Bit Runit IceWM
"Sometimes a man finds his destiny on the road he took to avoid it."
July 1, 2020 at 9:44 am #38408Moderator
Brian Masinick
::Nice job 👍
There are a few things in the list that I may add to my personal configuration.
Thank you for sharing your thoughts on the setup.
--
Brian MasinickJuly 1, 2020 at 10:32 am #38410Member
macondo
::Nice job
There are a few things in the list that I may add to my personal configuration.
Thank you for sharing your thoughts on the setup.
thanks, please add anything you want, same for other antiX users 🙂
- This reply was modified 2 years, 10 months ago by rokytnji.
antiX Core 64 Bit Runit IceWM
"Sometimes a man finds his destiny on the road he took to avoid it."
July 1, 2020 at 3:17 pm #38434Moderator
Brian Masinick
::I’m going to tighten up my network ports. I’ve done this in the past on several of my systems, but I have not done it recently, so your notes are very helpful in this regard!
--
Brian Masinick -
AuthorPosts
- You must be logged in to reply to this topic.