Linked by Igor Ljubuncic on Mon 21st Jun 2010 09:35 UTC
Privacy, Security, Encryption I've bored the readers of my personal website to death with two rather prosaic articles debating the Linux security model, in direct relation to Windows and associated claims of wondrous infections and lacks thereof. However, I haven't yet discussed even a single program that you can use on your Linux machine to gauge your security. For my inaugural article for OSNews, I'll leave the conceptual stuff behind, and focus on specific vectors of security, within the world of reason and moderation that I've created and show you how you can bolster a healthy strategy with some tactical polish, namely software.
Permalink for comment 430941
To read all comments associated with this story, please click here.
RE[3]: insecurity
by fewt on Mon 21st Jun 2010 18:58 UTC in reply to "RE[2]: insecurity"
fewt
Member since:
2010-06-09

"There are a lot of network based attacks that computers without firewalls are vulnerable to.

man in the middle attacks, spoofing, etc.


What?!? How exactly does a firewall mitigate man in the middle attacks or spoofing? That's just silly.
"

Spoofing IS a man in the middle attack.

- http://www.fwbuilder.org/4.0/docs/users_guide/ch15s02s06.html

- http://www.cipherdyne.org/LinuxFirewalls/ch01/

- http://www.aboutdebian.com/firewall.htm

Reply Parent Score: 1