Tue Dec 2 04:10:01 GMT 2003
1. Configuration control. Being able to always build a running system
from distributions, and archives.
2. Backups, used for failed disk hardware and occasional undeletes.
3. An audit facility to track who made changes to critical files.
4. Proper protection to make sure that critical files can only be modified
by those authorized.
The main reasons for these is to protect against hardware failures and
human error, not malicious users.
If you do this properly, then the damage a malicious user can do is
extremely limited. And you can repair all damages.
wb8tyw at qsl.network
Personal Opinion Only
More information about the samba-technical