Conclusion

I hope that this book has helped you to learn more about security in general and about Linux security in particular. In it, I described at length various computer attack methods and defenses from those attacks. This may make you form an impression that all every administrator is doing is fighting off bad guys trying to break into his or her system. My opinion is that there are no hackers and crackers. This is a scary tale invented to frighten administrators.

In any field of activity, there are strong and weak players. Most hackers are young people who simply happen to know more than others and can use their knowledge. For some reason, the information technologies field is considered a domain of gurus possessing almost supernatural knowledge. Perhaps, there was some truth to this conception at the dawn of the computer era, but it ceased to be this way a long, long time ago. Computers have become an inseparable part of our lives, as commonplace as telephones and television sets. Thus, they should be treated accordingly .

When you soup up your car, you may not be breaking any laws. The manufacturer certainly cannot prohibit you from doing this. The warranty, of course, will be voided, and there is no guarantee that the modifications will not kill the car way before its time. But you likely will not be persecuted for being an auto hacker.

All this means is that the main weapon for fighting hackers should be knowledge. If your system has been compromised, it does not necessarily mean that you should devote your outmost efforts to sending to prison the person who did this. You simply should give more attention to your server's security. If the overall level of knowledge and expertise and, correspondingly, the level of Internet services can be increased, there will be far fewer break-ins.

Constantly enhance your knowledge base, raise the level of your expertise, and expand your information store. Don't just rely on ready solutions to protect your system. Leaving your system full of holes is the same as leaving the canary cage's door open in a room with a hungry cat. Don't rely on the law to protect your system: The most lawenforcement agencies can do is catch the villain who stole your confidential information or destroyed it. But other than giving you some moral satisfaction, this will hardly be of any help. So you should be the one to protect your system. Remember, God helps those who help themselves .



Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net