1
<?xml version="1.0" encoding="utf-8"?>
2
<page xmlns="http://projectmallard.org/1.0/" xmlns:its="http://www.w3.org/2005/11/its" type="guide" style="task" id="net-security-tips" xml:lang="kn">
5
<link type="guide" xref="net-general"/>
7
<revision pkgversion="3.4.0" date="2012-02-21" status="final"/>
10
<name>Steven Richards</name>
11
<email its:translate="no">steven.richardspc@gmail.com</email>
14
<include xmlns="http://www.w3.org/2001/XInclude" href="legal.xml"/>
16
<desc>General tips to keep in mind when using the internet.</desc>
19
<title>Staying safe on the internet</title>
21
<p>A possible reason for why you are using Linux is the robust security that
22
it is known for. One reason that Linux is relatively safe from malware and
23
viruses is due to the lower number of people who use it. Viruses are targeted
24
at popular operating systems, like Windows, that have an extremely large user
25
base. Linux is also very secure due to its open source nature, which allows
26
experts to modify and enhance the security features included with each
29
<p>Despite the measures taken to ensure that your installation of Linux is
30
secure, there are always vulnerabilities. As an average user on the internet
31
you can still be susceptible to:</p>
35
<p>Phishing Scams (websites and emails that try to obtain sensitive
36
information through deception)</p>
39
<p><link xref="net-email-virus">Forwarding malicious emails</link></p>
42
<p><link xref="net-antivirus">Applications with malicious intent
46
<p><link xref="net-wireless-wepwpa">Unauthorised remote/local network
51
<p>To stay safe online, keep in mind the following tips:</p>
55
<p>Be wary of emails, attachments, or links that were sent from people
59
<p>If a website's offer is too good to be true, or asks for sensitive
60
information that seems unnecessary, then think twice about what
61
information you are submitting and the potential consequences if that
62
information is compromised by identity thieves or other criminals.</p>
65
<p>Be careful in providing any application
66
<link xref="user-admin-explain">root level permissions</link>, especially
67
ones that you have not used before or which are not well-known. Providing
68
anyone or anything with root level permissions puts your computer at high
69
risk to exploitation.</p>
72
<p>Make sure you are only running necessary remote-access services.
73
Having SSH or VNC running can be useful, but also leaves your computer
74
open to intrusion if not secured properly. Consider using a
75
<link xref="net-firewall-on-off">firewall</link> to help protect your
76
computer from intrusion.</p>