1
<?xml version="1.0" encoding="utf-8"?>
2
<page xmlns="http://projectmallard.org/1.0/" type="guide" style="task" id="net-security-tips" xml:lang="sl">
5
<revision version="3.2" date="2011-09-30" status="final"/>
7
<link type="guide" xref="net-general"/>
10
General tips to keep in mind when using the internet
13
<credit type="author">
14
<name>Steven Richards</name>
15
<email>steven.richardspc@gmail.com</email>
17
<include xmlns="http://www.w3.org/2001/XInclude" href="legal.xml"/>
20
<title>Staying safe on the internet</title>
22
<p>A reason why you may be using Linux is for the robust security that it is known for. One reason
23
Linux is relatively safe from malware and viruses is due to the number of people that use it.
24
Viruses are targeted at popular operating systems like Windows that have an extremely massive
25
user base. Linux is also very secure due to its open source nature which allows experts
26
to modify and enhance the security features included with each distribution.</p>
28
<p>Despite the measures taken to ensure your installation of Linux is secure, there
29
are always vulnerabilities. As an average user on the internet you are still susceptible to:</p>
32
<item><p>Phishing Scams (Sites that try to obtain sensitive information through deception)</p></item>
33
<item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item>
34
<item><p><link xref="net-antivirus">Applications with malicious intents (Viruses)</link></p></item>
35
<item><p><link xref="net-wireless-wepwpa">Unwarranted remote/local network access</link></p></item>
38
<p>To stay safe from malicious exploits, keep in mind the following tips:</p>
41
<item><p>Do not open emails, attachments, or links that were sent from people you do not know.</p></item>
42
<item><p>If a website's offer is too good to be true or asks for sensitive information
43
that seems unnecessary, then think twice about what you are submitting and the potential
44
consequences if that information is compromised by identity thieves or other criminals.</p></item>
45
<item><p>Be careful in providing any application root level permissions, especially ones that
46
you have not used before or apps that are not well-known. Providing anyone/anything with root level
47
permissions puts your computer at high risk to exploitation.</p></item>
48
<item><p>Make sure you are only running necessary remote-access services. Having
49
<app>SSH</app> or <app>VNC</app> running can be useful but also leaves your computer open to intrusion if not
50
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help
51
protect your computer from intrusion.</p></item>