26
<title>Staying safe on the internet</title>
26
<title>Tetap aman di internet</title>
28
28
<p>A possible reason for why you are using Linux is the robust security that
29
29
it is known for. One reason that Linux is relatively safe from malware and
39
39
<item><p>Phishing Scams (websites and emails that try to obtain sensitive information through deception)</p></item>
40
<item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item>
41
<item><p><link xref="net-antivirus">Applications with malicious intent (viruses)</link></p></item>
42
<item><p><link xref="net-wireless-wepwpa">Unauthorised remote/local network access</link></p></item>
40
<item><p><link xref="net-email-virus">Meneruskan surel jahat</link></p></item>
41
<item><p><link xref="net-antivirus">Aplikasi dengan niat jahat (virus)</link>.</p></item>
42
<item><p><link xref="net-wireless-wepwpa">Akses jaringan remote/local tanpa otorisasi</link></p></item>
45
<p>To stay safe online, keep in mind the following tips:</p>
45
<p>Agar tetap aman daring, ingatlah tip-tip berikut:</p>
48
48
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
49
49
<item><p>If a website's offer is too good to be true, or asks for sensitive information
50
50
that seems unnecessary, then think twice about what information you are submitting and the potential
51
51
consequences if that information is compromised by identity thieves or other criminals.</p></item>
52
<item><p>Be careful in providing any application <link xref="user-admin-explain">root level permissions</link>, especially ones that
53
you have not used before or apps that are not well-known. Providing anyone/anything with root level
54
permissions puts your computer at high risk to exploitation.</p></item>
52
<item><p>Berhati-hatilah dalam memberi <link xref="user-admin-explain">hak level root</link> ke sebarang aplikasi, khususnya yang belum pernah Anda pakai atau aplikasi yang tak dikenal baik. Memberi siapapun/apapun hak level root menempatkan komputer Anda pada risiko tinggi atas eksploitasi.</p></item>
55
53
<item><p>Make sure you are only running necessary remote-access services. Having
56
54
SSH or VNC running can be useful, but also leaves your computer open to intrusion if not
57
55
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help