>>> What are the characteristics of the systems one builds with LFS that
>>> establish the needs of what kind of internal security enhancements
>>> of what scope?  How far do *you* take it, and why?
>
>I do not trust an ISP's router.  I have my own between that and my
>internal network.

Neither do I!  I've searched online and this Actiontec brand has had
some issues.  I've turned off its radio and put a Linksys WRT54G
downstream reloaded with ddwrt--at least it's OSS Linux!

>There is always a tradeoff between security and convenience.  How much
>inconvenience you will but up with depends on the value of the data on
>your system.  You have to decide the value for yourself.

And I will, but I do get good ideas from other people with similar
challenges and experiences.

So I ask again, what do you all think are the characteristics of a
system that really needs more than traditional UNIX internal security,
and how much?

-- 
Paul Rogers
[email protected]
Rogers' Second Law: "Everything you do communicates."
(I do not personally endorse any additions after this line. TANSTAAFL
:-)

        

-- 
http://www.fastmail.com - Choose from over 50 domains or use your own

-- 
http://lists.linuxfromscratch.org/listinfo/lfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Do not top post on this list.

A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing in e-mail?

http://en.wikipedia.org/wiki/Posting_style

Reply via email to