Summary

In this chapter, we looked at several of the major operating systems used in the home environment. We also looked at some of the basic steps you can take to secure those systems. Keeping your home system secure can essentially be addressed by performing two major actions.

First, you must take the initial installation and configuration of the machine and secure it properly. Just because a machine has been bought at a store and has the operating system preloaded doesn't mean it is also properly secured. You must take the basic steps of configuring and double-checking the initial configuration of your new machine. Manufacturers often ship their machines or software with poor default settings. An example might be preinstalled software that ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.