First page Back Continue Last page Summary Graphics

Linux Security

  • Use an encrypted protocol whenever possible
  • Even if you can trust your own network, can you trust the Internet and the other end?
  • Insecured protocols: Telnet, IMAP, POP3, SMTP, HTTP, etc
  • Secured replacements: SSH/Telnet-SSL, IMAPS, POP3S, SMTP over TLS, HTTPS
  • Protocols are widely accepted and easy to implement, on both client and server