Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I'm interested in creating bombproof security. I'm looking for any good router/firewall systems that can finally keep some persistent pebbles out of my shoe, once and for all. Maybe a good router that will accomodate everything without requiring tweaking?
How can I really make my security bombproof?
Search and destroy programs that are simple to operate would be good, too. Why is there so little for Linux. You can get anything for Windows, but everyone assumes if you have Linux, you don't need any search and destroy.
Last edited by Whitestone; 08-14-2005 at 01:06 AM.
Thats google search engine especially designed for linux
You should try that, it can be handy in times, all you need to do is search in the general field such as firewalls, adware and spyware remover, virus scanners and so on ...
Remember that, in the Linux world, the default user normally does not have godly privileges. There is no "global registry" in which every house-key and crown-jewel in the kingdom will be stored. The things that may affect a user are generally confined to that user's home-directory, possibly in a hidden directory like .kde. (In Linux, hidden directories start with a period "." and they can be seen e.g. by appending the "-a" option to the "ls" command.)
It really isn't the case that "Linux is so much tougher and Windows is so much weaker" except that the default configuration of Windows makes it so: "for convenience," users are Administrators. They can do everything, which means that a rogue program running in their name can do so, too. If you keep your system up-to-date and are disciplined in your exercise of rootly privilege, you can keep your system secure. The scope of the problem is simply an indication of how many people do not.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.