Ways to protect the security of our devices

There are multiple tools that help us protect our devices

In previous articles we enumerated the most common sources of computer security problems and we asked if the use of Linux exempts us from taking precautions. Next, we will see ways to protect the security of our devices.

Just as the grandmothers said, they surely took him to prison. We can have our system updated to the second and take all the precautions, but we are part of a network and Networks are only as secure as the weakest link.

To put it more simply, one stupid person can harm millions of intelligent people. Years ago, the systems of an important communications company in Argentina were affected because someone downloaded a PDF with the programming of a lyrical theater to their work computer.

Ways to protect the security of our devices

There are two types of means to protect the security of our devices. They are:

  • Use of tools.
  • Good Use Practices.

use of tools

The habit (item of clothing) may not make the monk, but the habit (Repeated Practice) does make the monk. However, creating a habit takes time and The use of tools helps us detect our own security errors in addition to protecting us from those of others. And of course, let's not forget that we also need to protect ourselves from attacks.

Some of the types of tools mentioned here may be a bit much for home users. However, since many of the programs that we will mention in subsequent articles are free, open source and in the repositories, nothing prevents us from using them.

Computer security tools are classified into:

  • Network security monitoring: Allows you to identify unauthorized access to files from other devices connected to the network or from an external source.
  • Web vulnerability scanner: This type of tools analyzes applications and websites looking for flaws and vulnerabilities. In my early days as a website builder, I used an open source content management system that was just starting out. The developers did not realize a serious security problem and my client's website was used to scam Bank of America customers. I ended up changing my domain (paid for by me) and hosting since the entity's security team was eating up my bandwidth by monitoring the website incessantly. Today that content manager is one of the most secure and I learned my first lesson in computer security.
  • Encryption: Whether data is stored locally or in the cloud or transmitted between devices, it needs to be protected from the eyes of unauthorized people. The use of encryption algorithms makes it more difficult for them to be useful to computer criminals in the event of illegal access.
  • firewalls: Firewalls are literally the border guards of the network. Metaphorically speaking, they are on the border between the internal and external network and, in accordance with established security policies, they verify that the data packets that enter and leave meet the requirements.
  • Package trackers: They are applications that monitor the network for unjustified changes in traffic patterns such as spikes or drops at unusual times or software that misuses the network.
  • Anti-virus: Calling them antivirus is a simplification since these programs protect us from various types of malicious software by detecting, blocking and eliminating them from the system. It is worth mentioning that it not only detects and eliminates those that can affect the host operating system, but also those of other operating systems, preventing us from being a propagation vector.
  • Penetration tests: It is about putting yourself in the place of a potential attacker by looking for possible weak points in order to solve them. Most of the security problems detected in Linux come from these practices.

In the next article we will see what practices we can adopt as users to improve our security.

Leave a Comment

Your email address will not be published. Required fields are marked with *



  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.