<a name="662"></a><a name="wbp28Chapter21P1"></a>Chapter 21: Ten Security Vulnerabilities - Red Hat Linux Fedora For Dummies [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Fedora For Dummies [Electronic resources] - نسخه متنی

Jon Hall

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Chapter 21: Ten Security Vulnerabilities


Overview


In This Chapter



Simplifying your system



Encrypting your communications



Using firewalls



Updating your software



Backing up your data



Introducing buffer overflows



Getting social



Using good passwords



Scanning the horizon



Keeping track of your logs



They’re here! The monster is under the bed. That big wooden horse is full of Greeks. Here’s Johnny! Come into the light. And so on, and so on. However you say it, one thing’s for sure: The bad guys are out to get you.

Do you want the good news or the bad news first? The good news is, the Internet has changed the world for the better and continues to do so in more and unforeseen ways. And the speed of change will only accelerate. The bad news is, because the Internet is constantly changing, the number of ways that someone can use the Internet to hurt you is always growing. This chapter outlines some of the more dangerous spooks that lurk out on that poorly lit electronic street.

Our purpose in this chapter is to point you in the right direction so that you can gain a general awareness of computer security. Computer security is, unfortunately, a complex subject. Because of the complexity of the topic of security, we cannot hope to do any more here than touch on some important aspects. We just try to give you the most bang for your buck by adding a few simple but effective security measures to your new Red Hat Linux computer.

This chapter introduces ten important security topics. You can use them as a starting point to increase your computer security.

/ 194