On 2/11/06, Marcy Cortes <[EMAIL PROTECTED]> wrote: > Ah, ok, I see now - we haven't gotten as far as one facing the internet > - although I do hear that that's in phase 2 of one apps plans for this > year. I'll have to get you involved in that project :)
No you should not. Alan will insist on all kind of weird things just because he watched it being developed and now wants to see it getting used :-) :plug type=shameless. http://publib-b.boulder.ibm.com/abstracts/redp3870.html This redpaper is getting slightly outdated, but when you are familiar with z/VM you should be able to make the necessary adaptions and extensions. The paper shows that the configuration of a typical z/VM system is set up with the idea that general users can be trusted or at least risk their badge when they try bad things. Such a configuration leans towards convenience more than tight security. Virtual machines running Linux and connected to the outside world form a completely different audience and you may want to adapt your configuration. :eplug. Rob -- Rob van der Heij Velocity Software, Inc ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
