There are 10 mistakes that you’ll definitely want to avoid, for the sake of the ongoing health of one’s body. Because they may be fatal. As with all warnings in general, these warnings are important for newbies with Linux especially. Advanced Linux users won’t easily enter trouble, not even in the risk zone. To make a comparison with jet planes: everything depends on how you want to use your personal computer. If (for the moment?) the fight proven dependability of the F-18 is what you’re looking for, you can take advantage of the warnings below then.
11. Want more tips? 1. Software from third-party repositories (like PPA’s) and external .deb installers, is untested and unverified. So that it might damage the stability, the dependability and the security of your system even. Furthermore, you make yourself dependent on who owns the external repository, often only one person, who isn’t being checked in any way. By adding a PPA to your resources list, you give the owner of this PPA in principle full power over your system! Therefore only use a PPA when you really (really!) have no acceptable choice.
Or if you are a tester for a particular software application (which you should only be doing on a non-essential test computer). PPA’s are a blended blessing, to say the least. If used wisely and incredibly restrictively, PPA’s can on occasion be of great help. Have you already enabled PPA’s or other third-party repo’s and do you want to get rid of them? Then you can recreate a clean software resources list like this.
Files with the expansion .deb are split installers, like just .exe installers for Windows. You are able to debs from some websites download. When you double-click them, they require your password and then they install themselves in your system. Only install those .deb files that you trust completely. When you’re at all unsure about a .deb document, don’t set it up! These files are unchecked, unverified and may do harm to your system. They could even contain malware, like spy ware and such.
- Encourage the proper Kind of Sharing
- Start Audacity
- Content migration
- Run a Driver Scan
- A new startup business website
- Create an acceptance process for scheduling posts
This happens in the real world: I understand of at least one incident. 2. A root desktop would beat the security model that’s been set up for Ubuntu and Mint since their inception. Therefore, even the administrator logs along with mere user permissions. Applications are meant to be run with non-administrative user permissions (or as mere mortals), which means you have to raise their privileges to modify the underlying system.
For example, you wouldn’t want that recent crash of VLC to get rid of your complete /usr directory due to a bug. Or that vulnerability that was just published in LibreOffice, to allow an attacker to get a main shell. Or that destructive script on the website, to dominate your entire system by means of an (as yet) unpatched Firefox or Adobe Flash Player. It’s just good practice on any operating system, in truth the only sane practice, to perform your applications on a user level. Only administrative tasks should be executed with main permissions, on the per-need basis.
2.1. With sudo, pkexec and admin:// you give yourself underlying permissions (administrator power). You should only do this for system administration applications rather than for regular applications. Unnecessary use of sudo (and pkexec and admin://) can screw up your file and directory permissions, leading to all sorts of weird malfunctions. When you release an ordinary program with sudo, that application creates directories and files that are the property of root, rather than of you.
Plus it changes the ownership of some existing files to root. Never launch common applications with sudo (or pkexec or admin://). It’s unnecessary, it’s dangerous so you run a big risk of ruining the permissions of your own files. 3. Be cautious with the add-ons, extensions, applets and desklets that you set up.
3.1. Firefox add-ons with harmful software: they have happened, regardless of the malware scanning efforts by Mozilla. Don’t trust them blindly. This goes for Chromium/Chrome as well. And keep their amount down in any case: don’t change Firefox and Chromium/Chrome into a Christmas tree. The more extensions you install, the slower your browser becomes.
Furthermore, some add-ons could cause malfunctions in other add-ons, or even in the web browser itself. Perhaps you have already become the victim of this add-on? 3.2. Applets and desklets can beautify your desktop and add useful features even. But they can cause problems. So keep their quantity down. The greater desklets and applets you install, the slower one’s body becomes.