Solved

With Linux Ubuntu 64-Bit, Do I Need To Install Internet Security Software? What Do You Recommend? What Is Avaiable for the Ubuntu 64-Bit Version?

Posted on 2012-03-17
3
751 Views
Last Modified: 2012-03-19
Hello. I have a few questions to ask you.

With Linux Ubuntu 64-bit, do I need to install Internet security software?

Do you recommend adding Internet security software?

What security software brands or reliable software manufactures are available for Linux Ubuntu 64-bit operating system?

Are they free like most if not all Ubuntu programs or not?

Please answer and explain.

Thank you!
0
Comment
Question by:Bazingeroo
3 Comments
 
LVL 76

Assisted Solution

by:arnold
arnold earned 200 total points
ID: 37733873
It is included in the software iptables with sfw as the interface.
0
 
LVL 27

Accepted Solution

by:
serialband earned 300 total points
ID: 37734000
If you're not running any server services such as ssh or apache that are shared on the internet, you are probably ok without any extra protection.  If you do run server services, there are plenty of free, open source programs to protect your system.

If you want to have it available on the internet, with a full web server and/or a ssh server, you should get fail2ban and set thresholds to block attacks.  It may not matter too much if you have good passwords, but I install it because I don't like the constant attempts from remote sources.  ( http://www.fail2ban.org/wiki/index.php/Main_Page )

If you run a fileserver for windows, you should install some kind of virus scanner such as clamAV ( http://www.clamav.net/lang/en/ ) to minimize the infections on the user workstations.  It's better to catch some of the problems before they become problems to others.
0
 

Author Closing Comment

by:Bazingeroo
ID: 37740519
@ arnold & serialband:

Hello again.

Thank you for your comments.

I have awarded serialband the greater amount of points and the Accepted Solution for this question/thread because the greater specifics and examples provided.  

Again, thank you!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now