How to design secure network applications based on privilege separation

    Date23 Nov 2004
    Posted ByAnthony Pell
    This talk describes what are the basic security functionalities under Unix needed to build privilege separation and how to use them to design more secure applications.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.