Top Document: comp.security.unix and comp.security.misc frequently asked questions Previous Document: This faq Next Document: What do the "identd" lines in my syslog mean? Is this a security exposure? Can I turn off identd? See reader questions & answers on this topic! - Help others by sharing your knowledge No. We're security professionals. We try to secure systems. We think that securing systems and fixing bugs are more intellectual activities than running a program which someone else wrote which you don't understand. You should only attempt "penetration testing" of a system with the consent of its administrators and/or owners. They will only be interested in your services if you know something. You can start your education by learning some general computer science and computer programming, and by reading computer security textbooks and/or newsgroups. User Contributions:Top Document: comp.security.unix and comp.security.misc frequently asked questions Previous Document: This faq Next Document: What do the "identd" lines in my syslog mean? Is this a security exposure? Can I turn off identd? Single Page [ Usenet FAQs | Web FAQs | Documents | RFC Index ] Send corrections/additions to the FAQ Maintainer: flaps@dgp.toronto.edu (Alan J Rosenthal)
Last Update March 27 2014 @ 02:11 PM
|
Comment about this article, ask questions, or add new information about this topic: