I think your English is excellent ... especially compared to any attempt I might make to speak in
your native language.
Meanwhile ...
The single most important tool that you have in defending against "hackers" (and this is true in Linux
or Windows, although it's not used enough there) is the concept of
user-ids and
privileges. You need to:
- Know which user-ids exist on your system, and why they are there. (Many systems come with more user-ids than you actually use, and some of those might be enabled for log-in.)
- Use the computer, on an ordinary daily basis, from a user-id that is not an Administrator.
In order for a hacker to "break in," he must cause a program to be run on your computer, from some account that has "super-user" privileges. The programs he wants to run are those that do nasty,
system-wide things, but "ordinary" user-ids are not
allowed to do such things. And that is what you want. The easiest way that a hacker has to introduce a rogue program into your machine is to trick you, or someone, into running it.
But, if your account is
non-privileged, the rogue program .. fails. And that is what you want.
Windows actually gets a bad reputation for just one reason: most people are running it from an Administrator account, with no passwords. They have never even been
told about them, much less why they should use them. Consequently, the nasty folks slip a rogue-program to them, and the program executes without question...
Quote:
Rogue: "Computer, shoot yourself in the foot!"
Computer: "Yes, master..." (Ka-blam!
|
Anything that a privileged user (
or any program executing with such privileges) tells the machine to do, no matter how nonsensical or destructive,
will be done, without question, by the computer!