/usr/share/help/gl/gnome-help/net-security-tips.page is in gnome-user-docs-gl 3.28.1-0ubuntu1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 | <?xml version="1.0" encoding="utf-8"?>
<page xmlns="http://projectmallard.org/1.0/" xmlns:its="http://www.w3.org/2005/11/its" type="guide" style="task" id="net-security-tips" xml:lang="gl">
<info>
<link type="guide" xref="net-general"/>
<revision pkgversion="3.4.0" date="2012-02-21" status="final"/>
<revision pkgversion="3.18" date="2015-09-28" status="final"/>
<credit type="author">
<name>Steven Richards</name>
<email>steven.richardspc@gmail.com</email>
</credit>
<include xmlns="http://www.w3.org/2001/XInclude" href="legal.xml"/>
<desc>Suxestións xerais a ter en conta ao usar Internet.</desc>
<mal:credit xmlns:mal="http://projectmallard.org/1.0/" type="translator copyright">
<mal:name>Fran Dieguez</mal:name>
<mal:email>frandieguez@gnome.org</mal:email>
<mal:years>2011-2018</mal:years>
</mal:credit>
</info>
<title>Manterse seguro na Internet</title>
<p>A possible reason for why you are using Linux is the robust security that
it is known for. One reason that Linux is relatively safe from malware and
viruses is due to the lower number of people who use it. Viruses are targeted
at popular operating systems, like Windows, that have an extremely large user
base. Linux is also very secure due to its open source nature, which allows
experts to modify and enhance the security features included with each
distribution.</p>
<p>A pesar de que as medidas levadas a cabo para asegurar a súa instalación de Linux sexan seguras existen vulnerabilidades. Como usuario medio de internet tamén pode ser susceptíbel de:</p>
<list>
<item>
<p>Fraudes de suplantación de identidade (sitios web e correos electrónicos que tentan obter información sensíbel mediante unha suplantación)</p>
</item>
<item>
<p><link xref="net-email-virus">Reenvío de correos maliciosos</link></p>
</item>
<item>
<p><link xref="net-antivirus">Aplicativos con intencións maliciosas (virus)</link></p>
</item>
<item>
<p><link xref="net-wireless-wepwpa">Unauthorized remote/local network
access</link></p>
</item>
</list>
<p>Para conectarse de maneira segura, recorde as seguintes suxestións:</p>
<list>
<item>
<p>Teña coidado de correos electrónicos, anexos ou ligazóns que lle envíen persoas que non coñece.</p>
</item>
<item>
<p>If a website’s offer is too good to be true, or asks for sensitive
information that seems unnecessary, then think twice about what
information you are submitting and the potential consequences if that
information is compromised by identity thieves or other criminals.</p>
</item>
<item>
<p>Be careful in providing
<link xref="user-admin-explain">root level permissions</link> to any
application, especially ones that you have not used before or which are
not well-known. Providing anyone or anything with root level permissions
puts your computer at high risk to exploitation.</p>
</item>
<item>
<p>Asegúrese de que só está executando os servizos de acceso remoto necesarios. Tendo SSH ou VNC executándose pode ser útil, pero deixa o seu computador aberto á intrusión se non os asegura de forma correcta. Considere o uso dunha <link xref="net-firewall-on-off">devasa</link> que lle axude ao seu computador nas intrusións.</p>
</item>
</list>
</page>
|