mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2024-12-24 15:19:34 -05:00
Update README.md
This commit is contained in:
parent
a572756340
commit
39c40a18ac
12
README.md
12
README.md
@ -4,3 +4,15 @@ Files for enhancing Qubes VM security and privacy
|
||||
## rc.local: Protect sh and bash init files
|
||||
|
||||
Placed in /etc/rc.local of a template VM, this makes the shell init files immutable so PATH and alias cannot be used to hijack commands like su and sudo. I combed the dash and bash docs to address all the user-writable files. Feel free to comment or create issue if you see an omission or other problem.
|
||||
|
||||
|
||||
|
||||
|
||||
------
|
||||
|
||||
|
||||
## See also:
|
||||
|
||||
[Enabling dom0 prompt for sudo](https://www.qubes-os.org/doc/vm-sudo/#replacing-password-less-root-access-with-dom0-user-prompt)
|
||||
|
||||
[AppArmor Profiles](https://github.com/tasket/AppArmor-Profiles)
|
||||
|
Loading…
Reference in New Issue
Block a user