In This Chapter
Keeping your system up to date
Plugging security holes
Using the System Log Viewer
I am Inspector Clouseau, and I am on official police business.
You don't leave the front door of your house open when you go to work, do you? How about leaving it shut and locked but with a few nice big windows open? The problem is that many people do the equivalent every day with their computers, and they don't even know it! This chapter takes a look at where your computer's open doors and windows are — and what you can do to secure them.
Every user's actions affect your overall system security. If your family members or officemates need access to your Linux machine, take the time to sit down and explain the facts of secure life to them.
All users can download and install new software. Of course, which programs they can install are limited by user permissions. Here — as with any operating system — be sure you don't get a version of a program that has been tampered with, and keep in mind that some are all-out fakes that try to trick folks into installing them.
Most Linux applications and other Linux software programs are distributed by way of the Internet. In fact, the development cycle of new Linux software — and updates to it — depends on the Internet for file exchange, e-mail, and forum or newsgroup discussions. Make sure that you and other users of your Linux system are comfortable with the ...