20
20
<title>Staying safe on the internet</title>
22
<p>A reason why you may be using Linux is for the robust security that it is known for. One reason
23
Linux is relatively safe from malware and viruses is due to the number of people that use it.
24
Viruses are targeted at popular operating systems like Windows that have an extremely massive
25
user base. Linux is also very secure due to its open source nature which allows experts
22
<p>A possible reason for why you are using Linux is the robust security that
23
it is known for. One reason that Linux is relatively safe from malware and
24
viruses is due to the lower number of people who use it.
25
Viruses are targeted at popular operating systems like Windows, that have an extremely large
26
user base. Linux is also very secure due to its open source nature, which allows experts
26
27
to modify and enhance the security features included with each distribution.</p>
28
<p>Despite the measures taken to ensure your installation of Linux is secure, there
29
are always vulnerabilities. As an average user on the internet you are still susceptible to:</p>
29
<p>Despite the measures taken to ensure that your installation of Linux is secure, there
30
are always vulnerabilities. As an average user on the internet you can still be susceptible to:</p>
32
<item><p>Phishing Scams (Sites that try to obtain sensitive information through deception)</p></item>
33
<item><p>Phishing Scams (websites and emails that try to obtain sensitive information through deception)</p></item>
33
34
<item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item>
34
<item><p><link xref="net-antivirus">Applications with malicious intents (Viruses)</link></p></item>
35
<item><p><link xref="net-wireless-wepwpa">Unwarranted remote/local network access</link></p></item>
35
<item><p><link xref="net-antivirus">Applications with malicious intent (viruses)</link></p></item>
36
<item><p><link xref="net-wireless-wepwpa">Unauthorised remote/local network access</link></p></item>
38
<p>To stay safe from malicious exploits, keep in mind the following tips:</p>
39
<p>To stay safe online, keep in mind the following tips:</p>
41
<item><p>Do not open emails, attachments, or links that were sent from people you do not know.</p></item>
42
<item><p>If a website's offer is too good to be true or asks for sensitive information
43
that seems unnecessary, then think twice about what you are submitting and the potential
42
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
43
<item><p>If a website's offer is too good to be true, or asks for sensitive information
44
that seems unnecessary, then think twice about what information you are submitting and the potential
44
45
consequences if that information is compromised by identity thieves or other criminals.</p></item>
45
<item><p>Be careful in providing any application root level permissions, especially ones that
46
<item><p>Be careful in providing any application <link xref="user-admin-explain">root level permissions</link>, especially ones that
46
47
you have not used before or apps that are not well-known. Providing anyone/anything with root level
47
48
permissions puts your computer at high risk to exploitation.</p></item>
48
49
<item><p>Make sure you are only running necessary remote-access services. Having
49
<app>SSH</app> or <app>VNC</app> running can be useful but also leaves your computer open to intrusion if not
50
SSH or VNC running can be useful, but also leaves your computer open to intrusion if not
50
51
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help
51
52
protect your computer from intrusion.</p></item>