GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Can a government be trusted to provide security to a nation of computer users. On one hand they have resources that are beyond the scope of almost any company, and they have the power to bend other organizations to their will.
But it is true that government can often be slow & clumsy and inflexible. Yet there is talent in this field working on behalf of the government, for example the NSA has an interesting group of geeks who have discovered quite a lot about computer security (although it appears that they limit how much information that they wish to share with the rest of the public, as well as some of the select DoD teams, that also seem to limit their interactions with the outside world).
I believe that the primary concern of getting the government involved in computer security at a greater level is that it would be very difficult to trust that they really do have everyone’s best interest at heart. Or would such a group get bogged down by special interest graft, incompetent appointees (i.e. Mr. Brown), or unmotivated personnel with nothing to gain / lose.
It is possible that the government could field a strong and useful agency. Yet it is far more likely that they would create a mess of monumental proportion. To date the only example that I have been able to think of where (quasi) governmental agencies can manage to consistently outperform private enterprise, and that is college football.
Likes to use the word geek. It seems to be another life form.
Throw in virus, spyware, and adware. Some people apparently do not categorize the threats to their computer.
Mentions "trojans" without naming them. Alludes to the fact that a malicious hacker would just as well add your computer to his botnet as hack into a "large website".
Apparently people running servers on hosted websites are not all security experts. Hint: the requirement for starting an account is money, not experience.
The old "life expectancy of unpatched Windows" experiment. Before service pack 2 it was under a minute while some particulary nasty exploits were open.
Guess what, you are never 100% safe. Yes.
Surprise, computer experts have more knowledge than non experts. I doubt if they all wear hats, perhaps baseball caps with their favorite team.
It seems IE has security problems. Good thing "server-level" software is better. Not sure what he means there.
How should discovered software holes be disclosed? There are those darn geeks again.
Stuff to make things sound complicated and confusing.
Then ask why the government gets a default white hat instead of a baseball cap like everyone else.
This is not an informative article that explains things to reach a logical conclusion. It throws everything including the kitchen sink at the reader and makes a conclusion.
It is not total BS but it is not a great article.
I know you often ask about security in your posts cousinlucky. Are there particular things that interest you in the article?
Being a computer idiot the article was very confusing to me which is why I asked for opinions from this forums very aware members. The article seemed to bounce every which a way like it was cut up from different trains of thought. You might go as far as to say that I was bewildered.
The thought of some government bureau being put in charge of the Internet or computing caused a chill to run in my back.
I have been touched by multiple Hijackings and the like while using Microsoft XP on the Internet; and the trauma has not totally left me as yet, but I am very comfortable using Linux.
I suspect my ISP downloads something onto my computer every once in a while because I hear my computer clicking as it does during a download. Whatever it is my computer is not being hijacked, so it does not bother me too much.
I have been labeled as computer gullible so I sought qualified opinions.
Again my Sincere Thanks for everyone who took the time to respond to this.