|
38.
|
|
|
Never click on links in emails that lead to websites asking for passwords or similar information. It is possible for the text of the link to show one address, but clicking on the link actually connects to a different (possibly dangerous) address. Instead of clicking a potentially misleading link, type the link address directly into a web browser.
|
|
|
|
Never click on links in emails that lead to websites asking for passwords or similar information. It is possible for the text of the link to show one address, but clicking on the link actually connects to a different (possibly dangerous) address. Instead of clicking a potentially misleading link, type the link address directly into a web browser.
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:161(para)
|
|
39.
|
|
|
When visiting a website that asks for financial information, ensure that it is secure. <application>Konqueror</application> and <application>Firefox</application> are two browsers commonly used in <phrase>Kubuntu</phrase>. Both have two areas that indicate if the current page is secure. On secure webpages, the address bar will have a yellow background and a lock symbol to the right of the address. The second area is the status bar located at the bottom right of the browser window. If the page is secure, a lock icon will appear in this area. Clicking on either of the lock symbols will produce a dialog that explains the type of licensing and security for that page.
|
|
|
|
When visiting a website that asks for financial information, ensure that it is secure. <application>Konqueror</application> and <application>Firefox</application> are two browsers commonly used in <phrase>Kubuntu</phrase>. Both have two areas that indicate if the current page is secure. On secure webpages, the address bar will have a yellow background and a lock symbol to the right of the address. The second area is the status bar located at the bottom right of the browser window. If the page is secure, a lock icon will appear in this area. Clicking on either of the lock symbols will produce a dialogue that explains the type of licensing and security for that page.
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:171(para)
|
|
40.
|
|
|
Only download and run software from trusted sources. By default, software can only be downloaded directly from Ubuntu.
|
|
|
|
Only download and run software from trusted sources. By default, software can only be downloaded directly from Ubuntu.
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:185(para)
|
|
41.
|
|
|
Make backup copies of files
|
|
|
|
Make backup copies of files
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
docs/security/C/security.xml:195(title)
|
|
42.
|
|
|
Occasionally users lose computer information. There are many possible causes for such unforeseen <emphasis>data loss</emphasis>. The problem could be anything from a power loss or equipment failure to accidentally deleting a file. With regular backup copies, if a problem should occur, it may be possible to retrieve important files. Users are strongly encouraged to make backups.
|
|
|
|
Occasionally users lose computer information. There are many possible causes for such unforeseen <emphasis>data loss</emphasis>. The problem could be anything from a power loss or equipment failure to accidentally deleting a file. With regular backup copies, if a problem should occur, it may be possible to retrieve important files. Users are strongly encouraged to make backups.
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
docs/security/C/security.xml:184(para)
|
|
43.
|
|
|
Backup copies of files should be stored separately from the computer. In other words, backup file storage should be located somewhere that is not permanently attached to the computer. Options include:
|
|
|
|
Backup copies of files should be stored separately from the computer. In other words, backup file storage should be located somewhere that is not permanently attached to the computer. Options include:
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
docs/security/C/security.xml:192(para)
|
|
44.
|
|
|
Writable CDs and DVDs
|
|
|
|
Writable CDs and DVDs
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:209(para)
|
|
45.
|
|
|
External hard disks and flash memory devices
|
|
|
|
External hard disks and flash memory devices
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:210(para)
|
|
46.
|
|
|
Another computer on the network
|
|
|
|
Another computer on the network
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
../docs/security/C/security.xml:211(para)
|
|
47.
|
|
|
A simple way of backing up your files is to copy them manually to a safe location (see above) by using the <application>Konqueror</application> or <application>Dolphin</application> file manager.
|
|
|
|
A simple way of backing up your files is to copy them manually to a safe location (see above) by using the <application>Konqueror</application> or <application>Dolphin</application> file manager.
|
|
Translated and reviewed by
Jared Norris
|
|
|
|
Located in
docs/security/C/security.xml:219(para)
|