My Post-installation Configurations

Forum Forums General Tips and Tricks My Post-installation Configurations

  • This topic has 3 replies, 2 voices, and was last updated Jul 1-3:17 pm by masinick.
Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #38407
    Member
    macondomacondo

    Again folks, this is subjective, just the way I do things. 🙂

    After installing antiX, the first thing I configure is sudo.

    # visudo
    
    Put this line at the bottom of the file:
    
    <your_user_name>  ALL=NOPASSWD:ALL
    
    save/exit/reboot

    If you use nano,

    # nano /etc/sudoers

    ditto as above.

    Next, aliases make my life easier,

    $ nano .bash_aliases

    Paste this:

    alias adu="sudo apt-get update && sudo apt-get dist-upgrade"
    alias agi="sudo apt-get install"
    alias as="apt-cache search"
    alias ash="apt-cache show"

    logout/login and test it as USER:

    $ adu

    Go to .nanorc and type this:

    set smooth

    UFW (Uncomplicated Firewall)

    # apt-get install ufw
    # ufw enable
    # ufw status
    # reboot

    After coming back do another ‘ufw status’ to find out if the firewall
    is working.

    To avoid pinging: go to:

    # nano /etc/ufw/before.rules

    And leave this section looking like this:

    # ok icmp codes
    -A ufw-before-input -p icmp --icmp-type destination-unreachable -j DROP
    -A ufw-before-input -p icmp --icmp-type source-quench -j DROP
    -A ufw-before-input -p icmp --icmp-type time-exceeded -j DROP
    -A ufw-before-input -p icmp --icmp-type parameter-problem -j DROP
    -A ufw-before-input -p icmp --icmp-type echo-request -j DROP

    Next, go to http://www.grc.com and click on ShieldsUp, next screen scroll down to Hot
    Spots, and click on ShieldsUp again, next screen click on Proceed, next screen
    click on All Service Ports and let it check the ports, gives an ok result, the
    ports are neon green, and gives you this veredict:

    “Your system has achieved a perfect “TruStealth” rating. Not a single packet —
    solicited or otherwise — was received from your system as a result of our
    security probing tests. Your system ignored and refused to reply to repeated
    Pings (ICMP Echo Requests). From the standpoint of the passing probes of any
    hacker, this machine does not exist on the Internet. Some questionable personal
    security systems expose their users by attempting to “counter-probe the prober”,
    thus revealing themselves. But your system wisely remained silent in every way.
    Very nice.”

    Startup
    To start your apps and window manager: go to .xinitrc as USER,

    $ nano .xinitrc

    Put this:

    #!/bin/sh
    
    setxkbmap -option terminate:ctrl_alt_bksp
    xsetroot -solid black
    unclutter -idle 2 &
    numlockx &
    
    exec window manager

    I think this is about it, thanks for your patience.

    Happy trails,
    macondo

    antiX Core 64 Bit Runit XFS JWM

    "Sometimes a man finds his destiny on the road he took to avoid it."

    #38408
    Moderator
    masinickmasinick

    Nice job 👍

    There are a few things in the list that I may add to my personal configuration.

    Thank you for sharing your thoughts on the setup.

    Brian Masinick

    #38410
    Member
    macondomacondo

    Nice job

    There are a few things in the list that I may add to my personal configuration.

    Thank you for sharing your thoughts on the setup.

    thanks, please add anything you want, same for other antiX users 🙂

    • This reply was modified 2 months, 3 weeks ago by rokytnji.

    antiX Core 64 Bit Runit XFS JWM

    "Sometimes a man finds his destiny on the road he took to avoid it."

    #38434
    Moderator
    masinickmasinick

    I’m going to tighten up my network ports. I’ve done this in the past on several of my systems, but I have not done it recently, so your notes are very helpful in this regard!

    Brian Masinick

Viewing 4 posts - 1 through 4 (of 4 total)
  • You must be logged in to reply to this topic.