Book Reviews
Book Reviews

Is it Safe? Protecting Your Computer, Your Business, and Yourself Online
Times sure have changed since I got my first letter telling me about a defunct oil company in Nigeria. I now get several of these a week. Although the technology and sophistication of the fraud has changed, the danger is greater than ever. Almost any book on "safe surfing" will improve your chances of survival, but this book guarantees it as much as any book could. The book covers obligatory topics like viruses, spam, spyware, and phishing. However, it also goes into more complex issues like protecting your home network or company's web server, and even on-the-job surveillance.
Each of the main topics is covered in one of the eight parts of the book, each with three or more chapters. The first chapter of each part is "How Big a Problem," which provides background information about what the problem and what the scope of the the problem is. The next chapters are about defending yourself against the specific problem or fixing things after the fact.
This book was definitely not written for me or other IT professionals, but that makes it even more useful for the average user because you do not get bogged down with technical minutiae. Each topic is covered in the detail necessary for you to understand the issues involved well enough to protect yourself against the problems the book addresses. Even topics like "recognizing an in-process attack" on your company's server or describing the various types of attacks are easily understood and implemented. In some cases, the author could have provided more detail, but that is really not the intent of this book.
[...]
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

News
-
Two Local Privilege Escalation Flaws Discovered in Linux
Qualys researchers have discovered two local privilege escalation vulnerabilities that allow hackers to gain root privileges on major Linux distributions.
-
New TUXEDO InfinityBook Pro Powered by AMD Ryzen AI 300
The TUXEDO InfinityBook Pro 14 Gen10 offers serious power that is ready for your business, development, or entertainment needs.
-
Danish Ministry of Digital Affairs Transitions to Linux
Another major organization has decided to kick Microsoft Windows and Office to the curb in favor of Linux.
-
Linux Mint 20 Reaches EOL
With Linux Mint 20 at its end of life, the time has arrived to upgrade to Linux Mint 22.
-
TuxCare Announces Support for AlmaLinux 9.2
Thanks to TuxCare, AlmaLinux 9.2 (and soon version 9.6) now enjoys years of ongoing patching and compliance.
-
Go-Based Botnet Attacking IoT Devices
Using an SSH credential brute-force attack, the Go-based PumaBot is exploiting IoT devices everywhere.
-
Plasma 6.5 Promises Better Memory Optimization
With the stable Plasma 6.4 on the horizon, KDE has a few new tricks up its sleeve for Plasma 6.5.
-
KaOS 2025.05 Officially Qt5 Free
If you're a fan of independent Linux distributions, the team behind KaOS is proud to announce the latest iteration that includes kernel 6.14 and KDE's Plasma 6.3.5.
-
Linux Kernel 6.15 Now Available
The latest Linux kernel is now available with several new features/improvements and the usual bug fixes.
-
Microsoft Makes Surprising WSL Announcement
In a move that might surprise some users, Microsoft has made Windows Subsystem for Linux open source.