On Sat, 2002-09-21 at 13:37, Jim Wildman wrote:
> You can also use
> rpm -Va 
> to verify the integrity of all the rpms that have been installed.

-Remember that once the system has been broken into, you can't trust the
executables and libraries on it to give accurate results.  Keep static
versions of handy tools like ls, rpm, fsck, your RPM database, and so on
on a CD or diskette.

-Consider putting /usr on a separate hard drive and setting the jumpers
on the drive to read-only (some drives have this, on others you will
have to cut the 'write' lead on the cable, or rig a jumper yourself).

-Create and follow a written change-control policy (when do you install
new software, how do you test it first, who does it, where do you
document the change).  Don't go overboard on thi, it doesn't need to be
too complex.  Just make sure that if you aren't sure about a change you
can find out QUICKLY if it's legit.  Remember that it's easy to forget
some minor change you made six months ago.  This should include config
changes.

-David



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.openprojects.net

Reply via email to