Chapter 30. Securing Your Machines

<feature><title>In This Chapter</title> <objective>

Understanding Computer Attacks

</objective>
<objective>

Assessing Your Vulnerability

</objective>
<objective>

Protecting Your Machine

</objective>
<objective>

Viruses

</objective>
<objective>

Configuring Your Firewall

</objective>
<objective>

Forming a Disaster Recovery Plan

</objective>
<objective>

Keeping Up-to-Date on Linux Security Issues

</objective>
<objective>

Understanding SELinux

</objective>
<objective>

Reference

</objective>
</feature>

No home computer with a connection to the Internet is 100% safe. If this information does not concern you, it should! Although there is no way to stop a serious cracker who is intent on getting into your computer or network, there are ...

Get Fedora™ 7 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.