The first thing to do after installing Linux Mint Debian 201204

Linux Mint Debian is a line of desktop distribution based on Debian, developed by the same group responsible for Linux Mint, a desktop distribution based on Ubuntu Desktop.

The latest edition, released on April 24, is Linux Mint Debian 201204. Made available for download were the Xfce and MATE/Cinnamon editions. Both editions have already being reviewed here and here.

While both editions just work out of the box, they leave a very important feature disabled by default. That feature, is the firewall. The really bad thing about this distribution is not just that the firewall is not configured, but that there are open ports that leave your computer wide open for Black Hats to mess with. So, if you are running a new installation of any of the editions of this current release of Linux Mint Debian, the first and most important thing to do, is enable and configure the firewall. This tutorial shows you how to do it. And it actually involves just a few mouse clicks.

As on many Linux distributions, the firewall configuration utility is ufw, the Uncomplicated FireWall. It has three graphical interfaces that could be used to configure it. The only one available in the Linux Mint Debian repository is Gufw. While it is not as good as the others, it still gives you a user-friendly interface to get the job done.

Since it is installed by default, the only thing to do, is enable it. Launch it from the menu. You will find it under System > Firewall Configuration. It is shown below in its default state. To enable it, click the Unlock button.
Linux Mint Debian Gufw Disabled

After successful authentication, click the On/Off switch to enable it. The interface should now show some color. It is now enabled.
Linux Mint Debian Gufw Enabled

If you have no intention of allowing other computers to connect to any local service(s), you do not have to take any other action. No additional rule(s) is/are needed. The default rules, which allow all outgoing connections, while denying incoming connections that do not have a related entry in the State Table, is all the protection you need. If you need to add rules, this guide shows how to go about it.

Related Posts

Disk partitioning guide for Linux Mint Debian Linux Mint Debian is the latest version of Linux Mint. Unlike other versions of Mint, it is not based on Ubuntu, but rather on Debian Testing, and com...
NetworkManager: Secret weapon for the Linux road warrior NetworkManager is one of those "must-have" and "must-be-installed-by-default" applications that I like to see running on any Linux or BSD desktop dist...
How to layout and design an infographic in R For R fans and infographics lovers out there (I'm one of you), here's an article that shows how to layout and design an infographic in R. Here's ho...
How to uninstall the overlay-scrollbar in Pear Linux 6 and Ubuntu 12.10 Pear Linux is a desktop distribution based on Ubuntu Desktop. The latest edition of both distributions - Ubuntu 12.10 and Pear Linux 6, were released ...
Sabayon Linux 4 Installation Guide Sabayon Linux is a Gentoo-based, multi-purpose distribution. Like previous versions of Sabayon Linux, the latest upgrade version, Sabayon Linux 4, ins...
Cinnamon 1.6 review Alternate titles: Review of Cinnamon 1.6; Cinnamon 1.6 screen shot tour; Cinnamon screen shots; Cinnamon 1.6; Cinnamon 1.6 review; Cinnamon desktop. ...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 13/5/2012: Xfce 4.10, KDE 4.8.3, GNOME 3.5.1, GIMP 2.8 | Techrights

  2. -_-

    You’re a real security freak..

  3. empty words.

  4. Why do so many people assume that there is only one computer on the local net? Since the firewalls used are non-standard (at least according to the UNIX command set), it takes some digging to figure out exactly how someone hosed local connectivity.

    The better way to protect local machines is to put a hardware firewall between the local net and the cable/DSL modem. These can be had for $75 – $100 and protect the entire net. Or roll your own with a specialized Linux firewall distro and put everything else behind it. Otherwise, there will be holes between the different local systems, and if one falls, then any trust relationships between the systems will cause the entire local net to fall. If you are really paranoid, use both hardware and per-system firewalls. Per-system local firewalls on a local net without a hardware firewall is bad architecture.

    Use the force, Jed. You aren’t on Windows any more.

Leave a Comment

Your email address will not be published. Required fields are marked *

*