Difference between revisions of "Linux Security"
no edit summary
imported>Tele |
imported>Tele |
||
Line 78: | Line 78: | ||
:: because a lot of attacks already use detected and repaired vulnerabilities. | :: because a lot of attacks already use detected and repaired vulnerabilities. | ||
* Read why untested packages from outside the repository can be dangerous | * Read why untested packages from outside the repository can be dangerous | ||
* Read why we use programs with a closed source code and why can be dangerous | |||
* If you're a programmer: | * If you're a programmer: | ||
** Read about attacks on environmental variables | ** Read about attacks on environmental variables |