Summary
Security is an ever-changing field, and new ways of attacking systems are discovered all the time. The purpose of this chapter is to help you begin computing in a secure way. Linux is one of the most secure platforms around, but it's not bulletproof. Therefore, some extra steps can be taken to help ensure security.
We began this chapter with a section on choosing secure passwords. An easy-to-type password may be more convenient but would also be the first to be broken. We also discussed configuring the iptables firewall with Gufw, a graphical frontend to iptables that simplifies its creation. Then, we took a look at Mint's Domain Blocker tool (also known as Mint Nanny) to help you block websites from being accessed on your machine. We ended this chapter by talking about backups, snapshots, and hardening your system.
In the next chapter, Advanced Administration Techniques, we'll take a look at ways to monitor system resources, kill processes, keep an eye on your system...