On Sat, 12 Feb 2000, Rasane Shailesh wrote:

> 
> hi phillip,
        ^^

> i've been working on symmetric ciphers for the last
> one year. so cryptography is my forte. but
> "information security" is too vast. let me know what u
> want basically, and when.

Basically, read the security howto and present what's in that.  As well as
the most common ways people would use to break into a system, using ssh
rather than telnet, hosts.allow, hosts.deny.  I could speak about all
this, but I am not confident, and when I am not confident I tend to
stutter and make mistakes.

The idea is to inform people how to secure their machines from illegal
entry.  This would include entry over a network, entry directly from the
console, and unathorised entry of people already having accounts on the
machine (red hat pam bug etc).

Can you do this?

Philip

=======================================================================

Mathematicians practice absolute freedom.
                -- Henry Adams


To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list 
button and fill the appropriate information 
and submit. For any other queries contact the ML maintener

Reply via email to