1.1.10
by Jeremy Bicha
Import upstream version 3.3.1 |
1 |
<?xml version="1.0" encoding="utf-8"?>
|
2 |
<page xmlns="http://projectmallard.org/1.0/" type="guide" style="task" id="net-security-tips" xml:lang="pa"> |
|
3 |
||
4 |
<info>
|
|
5 |
<revision pkgversion="3.4.0" date="2012-02-21" status="final"/> |
|
6 |
||
7 |
<link type="guide" xref="net-general"/> |
|
8 |
||
9 |
<desc>
|
|
10 |
General tips to keep in mind when using the internet |
|
11 |
</desc>
|
|
12 |
||
13 |
<credit type="author"> |
|
14 |
<name>Steven Richards</name> |
|
15 |
<email>steven.richardspc@gmail.com</email> |
|
16 |
</credit>
|
|
17 |
<include xmlns="http://www.w3.org/2001/XInclude" href="legal.xml"/> |
|
18 |
</info>
|
|
19 |
||
20 |
<title>Staying safe on the internet</title> |
|
21 |
||
22 |
<p>A possible reason for why you are using Linux is the robust security that
|
|
23 |
it is known for. One reason that Linux is relatively safe from malware and |
|
24 |
viruses is due to the lower number of people who use it. |
|
25 |
Viruses are targeted at popular operating systems like Windows, that have an extremely large |
|
26 |
user base. Linux is also very secure due to its open source nature, which allows experts |
|
27 |
to modify and enhance the security features included with each distribution.</p>
|
|
28 |
||
29 |
<p>Despite the measures taken to ensure that your installation of Linux is secure, there
|
|
30 |
are always vulnerabilities. As an average user on the internet you can still be susceptible to:</p>
|
|
31 |
||
32 |
<list>
|
|
33 |
<item><p>Phishing Scams (websites and emails that try to obtain sensitive information through deception)</p></item> |
|
34 |
<item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item> |
|
35 |
<item><p><link xref="net-antivirus">Applications with malicious intent (viruses)</link></p></item> |
|
36 |
<item><p><link xref="net-wireless-wepwpa">Unauthorised remote/local network access</link></p></item> |
|
37 |
</list>
|
|
38 |
||
39 |
<p>To stay safe online, keep in mind the following tips:</p> |
|
40 |
||
41 |
<list>
|
|
42 |
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item> |
|
43 |
<item><p>If a website's offer is too good to be true, or asks for sensitive information
|
|
44 |
that seems unnecessary, then think twice about what information you are submitting and the potential |
|
45 |
consequences if that information is compromised by identity thieves or other criminals.</p></item>
|
|
46 |
<item><p>Be careful in providing any application <link xref="user-admin-explain">root level permissions</link>, especially ones that |
|
47 |
you have not used before or apps that are not well-known. Providing anyone/anything with root level |
|
48 |
permissions puts your computer at high risk to exploitation.</p></item>
|
|
49 |
<item><p>Make sure you are only running necessary remote-access services. Having
|
|
50 |
SSH or VNC running can be useful, but also leaves your computer open to intrusion if not |
|
51 |
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help |
|
52 |
protect your computer from intrusion.</p></item>
|
|
53 |
</list>
|
|
54 |
||
55 |
</page>
|