O'Reilly logo

Privacy Defended: Protecting Yourself Online by Chris Weber, William Chan, Gary Bahadur

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Unix/Linux

The growing popularity of Unix and particularly Linux has led to its appearance in many home-based machines. Many computer enthusiasts have installed this operating system on their machines and found that it can be both highly secure and highly complex. Many of the steps one takes to secure a Unix machine have analogous steps in the Microsoft world.

The basic steps of physically securing the machine remain the same. Regardless of the operating system, the same steps taken to physically secure a machine, its BIOS, and backups remain the same. Linux comes with file permission and directory setting as well as screensaver password protection. Years ago, Unix/Linux was more command-line driven. However, in today's flavors of Linux, graphical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required