On Sat, 12 Feb 2000, Rasane Shailesh wrote:
>
> hi phillip,
^^
> i've been working on symmetric ciphers for the last
> one year. so cryptography is my forte. but
> "information security" is too vast. let me know what u
> want basically, and when.
Basically, read the security howto and present what's in that. As well as
the most common ways people would use to break into a system, using ssh
rather than telnet, hosts.allow, hosts.deny. I could speak about all
this, but I am not confident, and when I am not confident I tend to
stutter and make mistakes.
The idea is to inform people how to secure their machines from illegal
entry. This would include entry over a network, entry directly from the
console, and unathorised entry of people already having accounts on the
machine (red hat pam bug etc).
Can you do this?
Philip
=======================================================================
Mathematicians practice absolute freedom.
-- Henry Adams
To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list
button and fill the appropriate information
and submit. For any other queries contact the ML maintener