Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Five Linux Security Myths You Can Live Without

Before I wrote this article, I went to some Linux newsgroups to find out what typical concerns among security-conscious Linux users might be. I asked, simply, what they felt were the biggest myths surrounding Linux security.

Boy, did I get an earful! It was as if I had gored someone's pet ox.

When I asked about the most common misperceptions of Linux security, I wasn't implying that Linux is any worse, or any better, than other operating systems. There are few "religions," however, with followers as zealous as those of Linux. As with any religion, you can't make zealots question the perfection of their belief systems.

It reminded me of an expression: You can always tell a Linux user--you just can't tell them much.

In spite of the flames, I got what I was looking for: The Linux security myths that are most likely to cause trouble for users and administrators. Some of these are more likely to trip up newbies, but they can turn up even among experienced users. And when you're talking about security, most of us deal with more than enough "trouble" without making any more for ourselves.

  • 1