~ubuntu-branches/ubuntu/saucy/gnome-user-docs/saucy-proposed

1.1.10 by Jeremy Bicha
Import upstream version 3.3.1
1
<?xml version="1.0" encoding="utf-8"?>
2
<page xmlns="http://projectmallard.org/1.0/" type="guide" style="task" id="net-security-tips" xml:lang="pa">
3
4
  <info>
5
    <revision pkgversion="3.4.0" date="2012-02-21" status="final"/>
6
7
    <link type="guide" xref="net-general"/>
8
9
    <desc>
10
    General tips to keep in mind when using the internet
11
    </desc>
12
 
13
    <credit type="author">
14
      <name>Steven Richards</name>
15
      <email>steven.richardspc@gmail.com</email>
16
    </credit>
17
    <include xmlns="http://www.w3.org/2001/XInclude" href="legal.xml"/>
18
  </info>
19
20
<title>Staying safe on the internet</title>
21
22
<p>A possible reason for why you are using Linux is the robust security that 
23
it is known for. One reason that Linux is relatively safe from malware and 
24
viruses is due to the lower number of people who use it.
25
Viruses are targeted at popular operating systems like Windows, that have an extremely large 
26
user base. Linux is also very secure due to its open source nature, which allows experts 
27
to modify and enhance the security features included with each distribution.</p>
28
29
<p>Despite the measures taken to ensure that your installation of Linux is secure, there
30
are always vulnerabilities. As an average user on the internet you can still be susceptible to:</p>
31
32
 <list>
33
  <item><p>Phishing Scams (websites and emails that try to obtain sensitive information through deception)</p></item>
34
  <item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item>
35
  <item><p><link xref="net-antivirus">Applications with malicious intent (viruses)</link></p></item>
36
  <item><p><link xref="net-wireless-wepwpa">Unauthorised remote/local network access</link></p></item>
37
 </list>
38
39
<p>To stay safe online, keep in mind the following tips:</p>
40
41
 <list>
42
  <item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
43
  <item><p>If a website's offer is too good to be true, or asks for sensitive information
44
that seems unnecessary, then think twice about what information you are submitting and the potential 
45
consequences if that information is compromised by identity thieves or other criminals.</p></item>
46
  <item><p>Be careful in providing any application <link xref="user-admin-explain">root level permissions</link>, especially ones that 
47
you have not used before or apps that are not well-known. Providing anyone/anything with root level 
48
permissions puts your computer at high risk to exploitation.</p></item>
49
  <item><p>Make sure you are only running necessary remote-access services. Having
50
SSH or VNC running can be useful, but also leaves your computer open to intrusion if not 
51
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help 
52
protect your computer from intrusion.</p></item>
53
 </list>
54
55
</page>