DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 7 T

⟦3d39c41cb⟧ TextFile

    Length: 1206 (0x4b6)
    Types: TextFile
    Names: »7.t«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦eed360c96⟧ »./papers/SRI-report/sri-report.troff.tar.Z« 
└─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit
    └─⟦eed360c96⟧ »EurOpenD3/security-doc.tar.Z« 
        └─⟦53b1903f6⟧ 
            └─⟦this⟧ »security-doc/7.t« 

TextFile

.NH 1
CONCLUSIONS
.PP
Computer security is playing an increasingly important role in our lives
as more and more operations become computerized,
and as computer networks become more widespread.
In order to protect your systems from snooping and vandalism by unauthorized
crackers,
it is necessary to enable the numerous security features provided by the
.SM UNIX
system.
.PP
In this document,
we have covered the major areas that can be made more secure:
.RS
.IP \(bu
Account security
.IP \(bu
Network security
.IP \(bu
File system security.
.RE
.LP
Additionally,
we have discussed how to monitor for security violations,
where to obtain security-related software and bug fixes,
and numerous mailing lists for finding out about security problems that have
been discovered.
.PP
Many crackers are not interested in breaking into specific systems,
but rather will break into any system that is vulnerable to the
attacks they know.
Eliminating these well-known holes and monitoring the system for other
security problems will usually serve as adequate defense against all but the
most determined crackers.
By using the procedures and sources described in this document,
you
.I can
make your system more secure.