>>> What are the characteristics of the systems one builds with LFS that >>> establish the needs of what kind of internal security enhancements >>> of what scope? How far do *you* take it, and why? > >I do not trust an ISP's router. I have my own between that and my >internal network.
Neither do I! I've searched online and this Actiontec brand has had some issues. I've turned off its radio and put a Linksys WRT54G downstream reloaded with ddwrt--at least it's OSS Linux! >There is always a tradeoff between security and convenience. How much >inconvenience you will but up with depends on the value of the data on >your system. You have to decide the value for yourself. And I will, but I do get good ideas from other people with similar challenges and experiences. So I ask again, what do you all think are the characteristics of a system that really needs more than traditional UNIX internal security, and how much? -- Paul Rogers [email protected] Rogers' Second Law: "Everything you do communicates." (I do not personally endorse any additions after this line. TANSTAAFL :-) -- http://www.fastmail.com - Choose from over 50 domains or use your own -- http://lists.linuxfromscratch.org/listinfo/lfs-support FAQ: http://www.linuxfromscratch.org/blfs/faq.html Unsubscribe: See the above information page Do not top post on this list. A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? A: Top-posting. Q: What is the most annoying thing in e-mail? http://en.wikipedia.org/wiki/Posting_style
