The first thing to do after installing Linux Mint Debian 201204

Linux Mint Debian Gufw Enabled

Linux Mint Debian is a line of desktop distribution based on Debian, developed by the same group responsible for Linux Mint, a desktop distribution based on Ubuntu Desktop.

The latest edition, released on April 24, is Linux Mint Debian 201204. Made available for download were the Xfce and MATE/Cinnamon editions. Both editions have already being reviewed here and here.

While both editions just work out of the box, they leave a very important feature disabled by default. That feature, is the firewall. The really bad thing about this distribution is not just that the firewall is not configured, but that there are open ports that leave your computer wide open for Black Hats to mess with. So, if you are running a new installation of any of the editions of this current release of Linux Mint Debian, the first and most important thing to do, is enable and configure the firewall. This tutorial shows you how to do it. And it actually involves just a few mouse clicks.

Related Post:  Guide to disks and disk partitions in Linux

As on many Linux distributions, the firewall configuration utility is ufw, the Uncomplicated FireWall. It has three graphical interfaces that could be used to configure it. The only one available in the Linux Mint Debian repository is Gufw. While it is not as good as the others, it still gives you a user-friendly interface to get the job done.

Since it is installed by default, the only thing to do, is enable it. Launch it from the menu. You will find it under System > Firewall Configuration. It is shown below in its default state. To enable it, click the Unlock button.
Linux Mint Debian Gufw Disabled

Related Post:  Deepin Terminal features split screens, search and ssh connections

After successful authentication, click the On/Off switch to enable it. The interface should now show some color. It is now enabled.
Linux Mint Debian Gufw Enabled

If you have no intention of allowing other computers to connect to any local service(s), you do not have to take any other action. No additional rule(s) is/are needed. The default rules, which allow all outgoing connections, while denying incoming connections that do not have a related entry in the State Table, is all the protection you need. If you need to add rules, this guide shows how to go about it.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer run network ads?  Yep, no more ads from the usual suspects that track and annoy you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal or your favorite cryptocurrency.

  • Bitcoin
  • Ethereum
  • Xrp
  • Bitcoin cash
  • Bitcoin sv
  • Litecoin
  • Binance coin
  • Cardano
  • Ethereum classic
Scan to Donate Bitcoin to bc1qzvlte2m224zkayhdc7fdfjkp2rsgt0l5a496ua

Donate Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x0F4362DFF77F3Ba0Dc637F5f3Eba35D09a2fA60C

Donate Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Xrp to r4ggjvL36njsMCYTkJ3S7cTHscPsMsSGQv

Donate Xrp to this address

Scan the QR code or copy the address below into your wallet to send some Xrp

Scan to Donate Bitcoin cash to qrs0dedzp9t55af3nfwypydghp29r0xguy9s20fz2k

Donate Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Bitcoin sv to 15K9TLyVDBtLuG9cYvXCX9SSkq9C9oUKHK

Donate Bitcoin sv to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin sv

Scan to Donate Litecoin to LetJ9QQMb7u2LMZ9Tu6rtHwcBcQFW98fbG

Donate Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Binance coin to bnb1ga8trq08ssqepd90v6225nzfgy448pu5pw8gxp

Donate Binance coin to this address

Scan the QR code or copy the address below into your wallet to send some Binance coin

Scan to Donate Cardano to addr1qx2354yw49etstfljpdhwja3ajjlt487lg95vu9ngy2q6vu4rf2ga2tjhqknlyzmwa9mrm997h20a7stgectxsg5p5esq5l7d9

Donate Cardano to this address

Scan the QR code or copy the address below into your wallet to send some Cardano

Scan to Donate Ethereum classic to 0xcD6CC972a2297FcafACDcfE042C55C69516a9264

Donate Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Subscribe for updates. Trust me, no spam!

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Upcoming events

4 Responses

  1. Why do so many people assume that there is only one computer on the local net? Since the firewalls used are non-standard (at least according to the UNIX command set), it takes some digging to figure out exactly how someone hosed local connectivity.

    The better way to protect local machines is to put a hardware firewall between the local net and the cable/DSL modem. These can be had for $75 – $100 and protect the entire net. Or roll your own with a specialized Linux firewall distro and put everything else behind it. Otherwise, there will be holes between the different local systems, and if one falls, then any trust relationships between the systems will cause the entire local net to fall. If you are really paranoid, use both hardware and per-system firewalls. Per-system local firewalls on a local net without a hardware firewall is bad architecture.

    Use the force, Jed. You aren’t on Windows any more.

Leave a Reply to Ryan Cancel reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.