GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I feel pretty safe. I do online port scan things and use nmap to my IP address from work and ususally find I'm in pretty good shape. I've started using ssh to my home box from work now, so that's a bit of a concern, but with a dynamic IP address, it helps to a certain extent (I think?).
Well, I feel pretty secure. And..who would want to access my computer? They'd find Linux ISO images, rpms, and a bunch of source code...
People don't attempt to access your computer to get what you have on it, most of the time they simply attempt to stick in a spam bot, worst cases they just delete your stuff to make room for theirs.
I would consider myself safe. Both in Linux and Windows I never worked under an administrative account, nor do I even work in a power user account in windows, only a purely restrictive account. If I need to install/uninstall something in windows, I use the Run As feature, otherwise I don't consider myself vulnerable when working in Windows at all. Of course I also don't use IE to browse, and shut off services I don't need. So, yea. I consider myself fairly secure.
I am also behind a router, configured not to respond to any outside pings. No port forwarding or anything either.
Notice I did NOT say I was 100% untouchable, though. Otherwise I wouldn't be using windows update, or following security advisories for my distro either.
Like most people now, I guess, I'm using a hardware router. It is set to only forward one port which I use for ssh with an encrypted key, and that is not using default ssh port.
I would say that users with a hardware router and no port forwarding are much safer than they used to be.
I have all ports open and all software acessible, why have I not been hacked? oh i have... but when you run a vm image there is nothing to hack anything that can be hacked can be brought back just as quickly.
I have all ports open and all software acessible, why have I not been hacked? oh i have... but when you run a vm image there is nothing to hack anything that can be hacked can be brought back just as quickly.
One of the things I was wondering about is running an unprotected win2k image in a vm and using it a honey trap. Be an interesting experiment.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.