old-www/LDP/Mobile-Guide/html/mobile-guide-p5c1s5-securit...

235 lines
3.8 KiB
HTML

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML
><HEAD
><TITLE
>Security in Different Environments</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
REL="HOME"
TITLE="Linux on the Road"
HREF="index.html"><LINK
REL="UP"
TITLE="Different Environments"
HREF="mobile-guide-p5c1-different-environments.html"><LINK
REL="PREVIOUS"
TITLE="Connections to Servers"
HREF="mobile-guide-p5c1s4-connections-to-servers.html"><LINK
REL="NEXT"
TITLE="Theft Protection"
HREF="mobile-guide-p5c1s6-theft-protection.html"></HEAD
><BODY
CLASS="sect1"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
SUMMARY="Header navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>Linux on the Road: </TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="mobile-guide-p5c1s4-connections-to-servers.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
>Chapter 15. Different Environments</TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="mobile-guide-p5c1s6-theft-protection.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="sect1"
><H1
CLASS="sect1"
><A
NAME="mobile-guide-p5c1s5-security-in-different-environments"
></A
>15.7. Security in Different Environments</H1
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN4349"
></A
>15.7.1. Introduction</H2
><P
>&#13; I am not a computer security expert, but I think that security associated
with mobile devices requires specific attention. Please read the
<A
HREF="http://www.linuxsecurity.com/Security-HOWTO"
TARGET="_top"
>Security-HOWTO</A
>
by Kevin Fenzi and Dave Wreski for more information. I just
collected some information below. Note, these means are just
small steps to additional security, though I recommend that you use them.
</P
><P
>&#13; Please read also the
<A
HREF="https://www.seifried.org/lasg/"
TARGET="_top"
>Linux Administrator's Security Guide (LASG) - FAQ</A
>
by Kurt Seifried.
</P
></DIV
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN4355"
></A
>15.7.2. Means of Security</H2
><P
>&#13;
<P
></P
><OL
TYPE="1"
><LI
><P
>&#13; Antivirus policy: For Linux there are some anti virus programms
available. Check the <SPAN
CLASS="acronym"
>BIOS</SPAN
> for an option to disable
writing at the boot sector.
</P
></LI
><LI
><P
>&#13; Laptop as a security risk itself: Since a laptop can easily be used to
intrude a network, it seems a good policy to ask the system
administrator for permission before connecting a laptop to a network.
</P
></LI
><LI
><P
>&#13; Secure Protocol: When connecting to a remote server always use a secure
protocol (for instance <B
CLASS="command"
>ssh</B
>) or tunneling
<B
CLASS="command"
>tunnelv</B
> , <B
CLASS="command"
>pptp</B
> and
<B
CLASS="command"
>APOP</B
> for POP accounts.
</P
></LI
></OL
>
</P
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="mobile-guide-p5c1s4-connections-to-servers.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="H"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="mobile-guide-p5c1s6-theft-protection.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Connections to Servers</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="mobile-guide-p5c1-different-environments.html"
ACCESSKEY="U"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Theft Protection</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>