235 lines
3.8 KiB
HTML
235 lines
3.8 KiB
HTML
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
|
|
<HTML
|
|
><HEAD
|
|
><TITLE
|
|
>Security in Different Environments</TITLE
|
|
><META
|
|
NAME="GENERATOR"
|
|
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
|
|
REL="HOME"
|
|
TITLE="Linux on the Road"
|
|
HREF="index.html"><LINK
|
|
REL="UP"
|
|
TITLE="Different Environments"
|
|
HREF="mobile-guide-p5c1-different-environments.html"><LINK
|
|
REL="PREVIOUS"
|
|
TITLE="Connections to Servers"
|
|
HREF="mobile-guide-p5c1s4-connections-to-servers.html"><LINK
|
|
REL="NEXT"
|
|
TITLE="Theft Protection"
|
|
HREF="mobile-guide-p5c1s6-theft-protection.html"></HEAD
|
|
><BODY
|
|
CLASS="sect1"
|
|
BGCOLOR="#FFFFFF"
|
|
TEXT="#000000"
|
|
LINK="#0000FF"
|
|
VLINK="#840084"
|
|
ALINK="#0000FF"
|
|
><DIV
|
|
CLASS="NAVHEADER"
|
|
><TABLE
|
|
SUMMARY="Header navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TH
|
|
COLSPAN="3"
|
|
ALIGN="center"
|
|
>Linux on the Road: </TH
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="left"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="mobile-guide-p5c1s4-connections-to-servers.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="80%"
|
|
ALIGN="center"
|
|
VALIGN="bottom"
|
|
>Chapter 15. Different Environments</TD
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="right"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="mobile-guide-p5c1s6-theft-protection.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
></TABLE
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"></DIV
|
|
><DIV
|
|
CLASS="sect1"
|
|
><H1
|
|
CLASS="sect1"
|
|
><A
|
|
NAME="mobile-guide-p5c1s5-security-in-different-environments"
|
|
></A
|
|
>15.7. Security in Different Environments</H1
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN4349"
|
|
></A
|
|
>15.7.1. Introduction</H2
|
|
><P
|
|
> I am not a computer security expert, but I think that security associated
|
|
with mobile devices requires specific attention. Please read the
|
|
<A
|
|
HREF="http://www.linuxsecurity.com/Security-HOWTO"
|
|
TARGET="_top"
|
|
>Security-HOWTO</A
|
|
>
|
|
by Kevin Fenzi and Dave Wreski for more information. I just
|
|
collected some information below. Note, these means are just
|
|
small steps to additional security, though I recommend that you use them.
|
|
|
|
|
|
</P
|
|
><P
|
|
> Please read also the
|
|
<A
|
|
HREF="https://www.seifried.org/lasg/"
|
|
TARGET="_top"
|
|
>Linux Administrator's Security Guide (LASG) - FAQ</A
|
|
>
|
|
by Kurt Seifried.
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN4355"
|
|
></A
|
|
>15.7.2. Means of Security</H2
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><OL
|
|
TYPE="1"
|
|
><LI
|
|
><P
|
|
> Antivirus policy: For Linux there are some anti virus programms
|
|
available. Check the <SPAN
|
|
CLASS="acronym"
|
|
>BIOS</SPAN
|
|
> for an option to disable
|
|
writing at the boot sector.
|
|
|
|
|
|
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Laptop as a security risk itself: Since a laptop can easily be used to
|
|
intrude a network, it seems a good policy to ask the system
|
|
administrator for permission before connecting a laptop to a network.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Secure Protocol: When connecting to a remote server always use a secure
|
|
protocol (for instance <B
|
|
CLASS="command"
|
|
>ssh</B
|
|
>) or tunneling
|
|
<B
|
|
CLASS="command"
|
|
>tunnelv</B
|
|
> , <B
|
|
CLASS="command"
|
|
>pptp</B
|
|
> and
|
|
<B
|
|
CLASS="command"
|
|
>APOP</B
|
|
> for POP accounts.
|
|
</P
|
|
></LI
|
|
></OL
|
|
>
|
|
|
|
</P
|
|
></DIV
|
|
></DIV
|
|
><DIV
|
|
CLASS="NAVFOOTER"
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"><TABLE
|
|
SUMMARY="Footer navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="mobile-guide-p5c1s4-connections-to-servers.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="H"
|
|
>Home</A
|
|
></TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="mobile-guide-p5c1s6-theft-protection.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
>Connections to Servers</TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="mobile-guide-p5c1-different-environments.html"
|
|
ACCESSKEY="U"
|
|
>Up</A
|
|
></TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
>Theft Protection</TD
|
|
></TR
|
|
></TABLE
|
|
></DIV
|
|
></BODY
|
|
></HTML
|
|
> |