Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




< Previous Section: The "Hacker" Word

1.3      Security and Linux

As Linux users we have some inherent advantages over our fellow Windows users when it comes to security (or lack there of). Hackers, rather like gamblers, use the laws of odds and averages in their endeavors to find vulnerable computer systems to break into. They will typically target the types of systems that have the most security vulnerabilities. They will also mostly focus attention on areas where there are the most opportunities for unprotected systems – in other words the types are system that are most common on the internet. In both these cases Windows is the predominant operating system. In security circles they say Windows has a larger “surface area” to attack both in terms of vulnerabilities and numbers of systems.

Linux is both more secure and less common than Windows based systems with the consequence that attacks on Linux systems occur less frequently than on Windows systems. Having said that it would be foolish to be complacent about securing any system regardless of whether it runs Windows, Linux or any other operating system.

The purpose of this book is to provide a step by step approach to securing a Linux system from outside attack. It is designed to be used and understood by both new and experienced Linux users.

< Previous Section: The "Hacker" Word

  © Copyright 2005-2010 Linuxtopia. All Rights Reserved.