{"id":601,"date":"2010-08-12T07:00:49","date_gmt":"2010-08-12T11:00:49","guid":{"rendered":"http:\/\/www.georgetoon.com\/blog\/?p=601"},"modified":"2010-08-12T14:42:15","modified_gmt":"2010-08-12T18:42:15","slug":"surf-safely","status":"publish","type":"post","link":"https:\/\/www.georgetoon.com\/blog\/surf-safely\/","title":{"rendered":"Surf Safely."},"content":{"rendered":"<div id=\"attachment_638\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.georgetoon.com\/blog\/wp-content\/uploads\/2010\/08\/computer-virus-toon.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-638\" class=\"size-medium wp-image-638 \" title=\"computer virus toon\" src=\"http:\/\/www.georgetoon.com\/blog\/wp-content\/uploads\/2010\/08\/computer-virus-toon-300x207.jpg\" alt=\"Computer virus\" width=\"300\" height=\"207\" srcset=\"https:\/\/www.georgetoon.com\/blog\/wp-content\/uploads\/2010\/08\/computer-virus-toon-300x207.jpg 300w, https:\/\/www.georgetoon.com\/blog\/wp-content\/uploads\/2010\/08\/computer-virus-toon.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p id=\"caption-attachment-638\" class=\"wp-caption-text\">Surf safely with Linux and this will never happen to you.<\/p>\n<\/div>\n<p>Last week, I was running around trying to get several things done at the same time.\u00a0 I booted my computer and logged in.\u00a0 In between starting dinner and letting the dog out, I checked my email.\u00a0 I received a message from a Facebook friend suggesting I visit a particular site.<\/p>\n<p>Ordinarily, I recognize these <a title=\"Facebook phishing\" href=\"http:\/\/www.facebook.com\/group.php?gid=9874388706\" target=\"_blank\">phishing attempts<\/a> and simply delete them.\u00a0 However, this time, without thinking (I was running around, remember?), I clicked the link.<\/p>\n<p>I immediately said to myself, &#8220;DOH!\u00a0 No!\u00a0 No! No!\u00a0 Stop! Stop! Stop!\u00a0 It&#8217;s a scam!!!\u00a0 It&#8217;s a link to a virus!!!!&#8221;\u00a0 Well, too late.\u00a0 The browser had already taken me to the virus laden destination and&#8230;.nothing.<\/p>\n<p>That&#8217;s right.\u00a0 Nothing happened to my system. No infection, no virus, no Trojan, no malware.\u00a0 Nothing downloaded.\u00a0 Everything went on normally.<\/p>\n<p>Why? Because I run Linux.\u00a0 <a title=\"Linux security\" href=\"http:\/\/www.tuxradar.com\/newtolinux#security\" target=\"_blank\">Linux is immune to Windows viruses and malware, and trojans.<\/a> I can surf safely all over the web\u00a0 without a worry of anything infecting my computer.<\/p>\n<p>If I accidentally click on a malicious link, chances are very good its probably written for Windows.\u00a0 It needs Windows to execute and\u00a0 deliver its payload.\u00a0 Even if it were written for my specific version of Linux, I&#8217;d still need to give it permission at the administrator (root) level, plus modify its properties in order to get it to run.\u00a0 The virus\/trojan simply has too many hoops to jump through.<\/p>\n<p>Even then, by force of habit, Linux users don&#8217;t install software from outside.\u00a0 Linux comes with hundreds of programs already installed.\u00a0 If you need anything else, you simply download and install from its <a title=\"Software repository\" href=\"http:\/\/en.wikipedia.org\/wiki\/Software_repository\" target=\"_blank\">repository<\/a>, not from different websites scattered around the internet.<\/p>\n<p>The majority of viruses are built to target and exploit Windows computers.\u00a0 Get the target off your back.\u00a0 <a title=\"Ten reasons to switch\" href=\"http:\/\/www.tuxmagazine.com\/node\/1000117\" target=\"_blank\">Get Linux<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, I was running around trying to get several things done at the same time.\u00a0 I booted my computer and logged in.\u00a0 In between starting dinner and letting the dog out, I checked my email.\u00a0 I received a message from a Facebook friend suggesting I visit a particular site. Ordinarily, I recognize these phishing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[9],"class_list":["post-601","post","type-post","status-publish","format-standard","hentry","category-blog","tag-linux"],"_links":{"self":[{"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/posts\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/comments?post=601"}],"version-history":[{"count":12,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/posts\/601\/revisions"}],"predecessor-version":[{"id":653,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/posts\/601\/revisions\/653"}],"wp:attachment":[{"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/media?parent=601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/categories?post=601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.georgetoon.com\/blog\/wp-json\/wp\/v2\/tags?post=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}