|
68.
|
|
|
To see what services are associated with the open ports, run:
|
|
|
|
(no translation yet)
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:152(para)
|
|
69.
|
|
|
lsof -i -n -P
|
|
|
|
(no translation yet)
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:153(command)
|
|
70.
|
|
|
You can also make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
|
|
|
|
(no translation yet)
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:156(para)
|
|
71.
|
|
|
Actual monitoring of your network traffic can be done with either <application>Wireshark</application> or <application>Snort</application>. <application>Wireshark</application> can analyze network packets and <application>Snort</application> is used in Network Intrusion Detection Systems (NIDS) and will notify you of unusual traffic.
|
|
|
|
(no translation yet)
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:157(para)
|
|
72.
|
|
|
Avoid Internet nuisances and crime
|
|
|
|
Avoid Internet nuisances and crime
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:161(title)
|
|
73.
|
|
|
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
|
|
|
|
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:162(para)
|
|
74.
|
|
|
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
|
|
|
|
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:163(para)
|
|
75.
|
|
|
Unwanted (unsolicited) mail tends to fall in to one of several categories:
|
|
|
|
Unwanted (unsolicited) mail tends to fall in to one of several categories:
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:164(para)
|
|
76.
|
|
|
Spam (junk) email, where people offer unwanted services and products
|
|
|
|
Spam (junk) email, where people offer unwanted services and products
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:166(para)
|
|
77.
|
|
|
Scam emails, where people pretend to ask for help in exchange for large sums of money
|
|
|
|
Scam emails, where people pretend to ask for help in exchange for large sums of money
|
|
Translated and reviewed by
Nick Ellery
|
|
|
|
Located in
keeping-safe/C/keeping-safe.xml:167(para)
|