TUCOWS NETWORK

   LINUXBERG | TUCOWS | FREETHEMES | GAMINGPLACE | eBarn | PDA Central | HOME

HOW TO - Home

Click here!

What's new About Us Contact Us Advertise



Welcome to HowTo! The premier Linux information resource center.
____________________________________

H HOWTO 's 

html'd
(HOWTOs in html)
plain text
(HOWTOs in plain text for printing)
html'd
(Mini-HOWTOs)
plain text
(Mini-HOWTOs)


LDP Additions
(Latest from LDP)
Other Formats
(LDP Other Formats)
Translations
(LDP Other Languages)
Unmaintained
(LDP Unmaintained)


Contrib
(Submitted Documentation)
FAQ
(Frequently Asked Questions)
Links
(Links page)
IRC Information
(IRC Page)
ISPs
(Linux Friendly ISPs)
Book Store
(Books through Amazon.com)
RFC Index
(Request For Comments)
Man Pages
(Linux Manual Pages)
LUGs
(Linux User Group Listing)

 


Linux Security HOWTO: Conclusion Next Previous Contents

14. Conclusion

By subscribing to the security alert mailing lists, and keeping current, you can do a lot towards securing your machine. If you pay attention to your log files and run something like tripwire regularly, you can do even more.

A reasonable level of computer security is not difficult to maintain on a home machine. More effort is required on business machines, but Linux can indeed be a secure platform. Due to the nature of Linux development, security fixes often come out much faster than they do on commercial operating systems, making Linux an ideal platform when security is a requirement.


Next Previous Contents

TUCOWS NETWORK
_________________________________
Last Edited: Thursday, January 21, 1999 03:11 PM
Maintainer:
Rob Kennedy (rob@linuxberg.com)
Site Design - Graphicjam Digital Arts Inc. 1999.

® 1999 TUCOWS Interactive Ltd. All rights reserved