Securing your account: Difference between revisions

Marked this version for translation
(Marked this version for translation)
Line 25: Line 25:
= General best practices = <!--T:6-->
= General best practices = <!--T:6-->


== Sharing data ==
== Sharing data == <!--T:8-->
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.


== For the system you log in from ==
== For the system you log in from == <!--T:9-->


<!--T:10-->
Security issues often start on the outside, by a third party getting access to a user's password or (passwordless) ssh key. To help prevent this, please:
Security issues often start on the outside, by a third party getting access to a user's password or (passwordless) ssh key. To help prevent this, please:
* Log in from trusted computers only;
* Log in from trusted computers only;
Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837

edits