Adsons

    How to design secure network applications based on privilege separation

    Date23 Nov 2004
    5707
    Posted ByLinuxSecurity Advisories
    This talk describes what are the basic security functionalities under Unix needed to build privilege separation and how to use them to design more secure applications.

    Comments powered by CComment

    Sidebar Ad

    LinuxSecurity Poll

    Does your company/organization utilize open-source software?

    Message!

    Poll results are hidden from public viewing.

    You are not authorized to vote on this poll.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    5
    radio
    bottom200

    Advisories