Avoiding cyberattack

Self-Protection

Article from Issue 120/2010
Author(s):

One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.

You have probably read about various options for high-performance computing with Linux in this month’s issue. But, what do the bad guys do when they need high-performance computing? They break into other people’s computers and use them. So, how can you avoid becoming part of a botnet and, more importantly, avoid having your personal information, banking details, and other sensitive information sold to someone in a foreign country?

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Unetbootin

    Unetbootin lets users set up almost any distribution on a bootable USB stick.

  • This Month's DVD

    Light Distro Sampler This month we give you a multilingual, multidistro DVD with six light Live Linux distributions. Try one, or try them all.

  • SliTaz

    In a world of multi-gigabyte Linux distributions, it's refreshing to see lightweight distributions like Puppy Linux and Damn Small Linux. But even these distributions look fat next to SliTaz.

  • Ask Klaus!

    Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine.com

  • Create a Multi-boot USB Stick with MultiSystem
comments powered by Disqus

Direct Download

Read full article as PDF:

042-043_kurt.pdf (1.25 MB)

News