On 2/11/06, Marcy Cortes <[EMAIL PROTECTED]> wrote:

> Ah, ok, I see now - we haven't gotten as far as one facing the internet
> - although I do hear that that's in phase 2 of one apps plans for this
> year.  I'll have to get you involved in that project :)

No you should not. Alan will insist on all kind of weird things just
because he watched it being developed and now wants to see it getting
used  :-)

:plug type=shameless. http://publib-b.boulder.ibm.com/abstracts/redp3870.html
This redpaper is getting slightly outdated, but when you are familiar
with z/VM you should be able to make the necessary adaptions and
extensions.
The paper shows that the configuration of a typical z/VM system is set
up with the idea that general users can be trusted or at least risk
their badge when they try bad things. Such a configuration leans
towards convenience more than tight security. Virtual machines running
Linux and connected to the outside world form a completely different
audience and you may want to adapt your configuration.
:eplug.

Rob
--
Rob van der Heij
Velocity Software, Inc

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to