TranslateProject/sources/tech/20170208 5 security tips for shared and public computers.md
2017-02-09 09:28:18 +08:00

3.5 KiB
Raw Blame History

5 security tips for shared and public computers

For many of us, the most important part of security is making our personal data safe. The best security will withstand any abuse, theoretically. However, in the real world, you cant cover all possible situations of abuse. Therefore, the best strategy is to use multiple techniques for increasing security. Most normal people dont need complicated schemes and cryptography to be safe. But its good to make it hard for intruders to get access to your data.

It may sound silly, but the computer in a library, a classroom, or a lab — or your friends phone for that matter — arent yours. Even cloud or cloud services in general are usually just someone elses computer. In general, treat any devices you dont own as if theyre owned by a villain — in other words, someone who wants your data for evil purposes.

Here are some simple ways you can increase your data security against miscreants or intruders.

Close open sessions

When youre finished with the device, log out of services such as Facebook or other sites. This helps keep an evildoer from reopening the windows and having access to your account.

Clean browser and other cache

Clear all your history, passwords, and cookies from the browser you used. Dont assume this is the default behavior on logout. Depending on the platform, check caches as well. You can delete the ~/.cache folder if youre on a modern Linux system.

Empty the trash

Remove any items left behind on the desktop, if applicable, and empty the accounts Trash or Recycle Bin.

Use service security options

Enable login notifications or approvals for your services and accounts. Some services have an option that notifies you when someone logs into your account from a new device or location. Youll also get a notice when you login legitimately. But its helpful to know if someone tries to use your login unexpectedly from another computer or location.

Other services may allow you to approve any login activity via an email notice. Access is only granted if you approve via a link in the email you receive. Check your services to see if they offer either of these security options.

Limit sensitive data

The easiest way to keep data safe on a computer you dont own is not to process it to begin with. Try to avoid or limit work that needs sensitive information. For example, you might not want to access bank or credit card accounts, or secure systems for your workplace.

You may want to consider using a Live USB-based operating system for these purposes. Live USB limits or even completely avoids any data storage on the host computer system where you run it. You can download a Live Fedora Workstation operating system for use on a USB stick, for example.


via: https://fedoramagazine.org/5-security-tips-shared-public-computers/

作者:Sylvia Sánchez 译者:译者ID 校对:校对者ID

本文由 LCTT 原创编译,Linux中国 荣誉推出