No subject


Tue Dec 2 04:10:01 GMT 2003


1. Configuration control.  Being able to always build a running system
from distributions, and archives.

2. Backups, used for failed disk hardware and occasional undeletes.

3. An audit facility to track who made changes to critical files.

4. Proper protection to make sure that critical files can only be modified
   by those authorized.

The main reasons for these is to protect against hardware failures and
human error, not malicious users.

If you do this properly, then the damage a malicious user can do is
extremely limited.  And you can repair all damages.

-John
wb8tyw at qsl.network
Personal Opinion Only





More information about the samba-technical mailing list