Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 8

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 7
2. Foreword
Before getting into specifics, let's try to briefly answer some questions about why we need to be concerned
about security in the first place.
It is easy to see why an e−commerce site, an on−line bank, or a government agency with sensitive documents
would be concerned about security. But what about the average user? Why should even a Linux home
Desktop user worry about security?
Anyone connected to the Internet is a target, plain and simple. It makes little difference whether you have a
part−time dialup connection, or a full−time connection, though full−time connections make for bigger targets.
Larger sites make for bigger targets too, but this does not let small users off the hook since the "small
user" may be less skilled and thus an easier victim. Red Hat, and Red Hat based distributions, tend to make
for bigger targets as well, since the installed user base is so large.
There are those out there that are scanning just for easy victims all the time. If you start logging unwanted
connection attempts, you will see this soon enough. There is little doubt that many of these attempts are
maliciously motivated and the attacker, in some cases, is looking for Linux boxes to crack. Does someone on
the other side of the globe really want to borrow my printer?
What do they want? Often, they just may want your computer, your IP address, and your bandwidth. Then
they use you to either attack others, or possibly commit crimes or mischief and are hiding their true identity
behind you. This is an all too common scenario. Commercial and high−profile sites are targeted more directly
and have bigger worries, but we all face this type of common threat.
With a few reasonable precautions, Red Hat Linux can be very secure, and with all the available tools, makes
for a fantastically fun and powerful Internet connection or server. Most successful break−ins are the result of
ignorance or carelessness.
The bottom line is:
Do you want control of your own system or not?
Do you want to unwittingly participate in criminal activity?
Do you want to be used by someone else?
Do you want to risk losing your Internet connection?
Do you want to have to go through the time consuming steps of reclaiming your system?
Do you want to chance the loss of data on your system?
These are all real possibilities, unless we take the appropriate precautions.
If you are reading this because you have already been broken
into, or suspect that you have, you cannot trust any of your
system utilities to provide reliable information. And the
suggestions made in the next several sections will not help
you recover your system. Please jump straight to the Have I
been Hacked? section, and read that first.
2. Foreword 5
Vedere la pagina 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 81 82

Commenti su questo manuale

Nessun commento