Install the Solaris 8 operating environment and applications from the original CD-ROM media.
Do not use the upgrade procedure. Do a fresh installation.
Assign every user his or her own personal account.
Make sure all accounts have passwords.
Make sure that users don’t share passwords. Tell them that this is for their own good.
Make sure no two accounts have the same user ID (UID).
Use “good” passwords. (See Chapter 1, “Enterprise Security Framework,” for more information.)
If possible, generate passwords automatically. (Consider using genpass, described in Chapter 7, “open source Security Tools.”)
Use the root account as little as possible.
Periodically scan your entire file system for SUID/SGID files, and save the lists. Any ...