As Linux users we have some
inherent advantages over our
fellow Windows users when it comes to security (or lack there of).
rather like gamblers, use the laws of odds and averages in their
find vulnerable computer systems to break into. They will typically
types of systems that have the most security vulnerabilities. They will
mostly focus attention on areas where there are the most opportunities
unprotected systems – in other words the types are system that are most
on the internet. In both these cases Windows is the predominant
In security circles they say Windows has a larger “surface area” to
in terms of vulnerabilities and numbers of systems.
Linux is both more secure and
less common than Windows based
systems with the consequence that attacks on Linux systems occur less
frequently than on Windows systems. Having said that it would be
foolish to be
complacent about securing any system regardless of whether it runs
Linux or any other operating system.
The purpose of this book is to provide a
step by step
approach to securing a Linux system from outside attack. It is designed
used and understood by both new and experienced Linux users.