David Dyer-Bennet wrote:
> 
> Russ Allbery <[EMAIL PROTECTED]> writes on 8 September 1999 at 16:13:46 -0700
>  > Ken Jones <[EMAIL PROTECTED]> writes:

blah blah.

If you want a secure system follow these rules:

1) Only grant shell access to trusted users.

2) Physical security

3) Shut off un-needed services

4) Run trusted programs

5) Monitor news and lists for new exploits

6) Practice "Safe Coding"

7) Have good backups

8) Upgrade 

Anything else you will need risk assesment to determine how
much you are willing to be hacked, and how expensive it is
to recover.

Ken Jones
Inter7

Reply via email to