Chapter 19. A Secure Linux Box Is a Happy Linux Box

In This Chapter

  • Keeping your system up to date

  • Plugging security holes

  • Using the System Log Viewer

 

I am Inspector Clouseau, and I am on official police business.

 
 --Inspector Clouseau

You don't leave the front door of your house open when you go to work, do you? How about leaving it shut and locked but with a few nice big windows open? The problem is that many people do the equivalent every day with their computers, and they don't even know it! This chapter takes a look at where your computer's open doors and windows are — and what you can do to secure them.

Every user's actions affect your overall system security. If your family members or officemates need access to your Linux machine, take the time to sit down and explain the facts of secure life to them.

Updating Your Software

All users can download and install new software. Of course, which programs they can install are limited by user permissions. Here — as with any operating system — be sure you don't get a version of a program that has been tampered with, and keep in mind that some are all-out fakes that try to trick folks into installing them.

Most Linux applications and other Linux software programs are distributed by way of the Internet. In fact, the development cycle of new Linux software — and updates to it — depends on the Internet for file exchange, e-mail, and forum or newsgroup discussions. Make sure that you and other users of your Linux system are comfortable with the ...

Get Linux® for Dummies®, 9th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.