O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementation Vulnerabilities

Implementation vulnerabilities are caused by a bad implementation (compare this to design vulnerabilities). Although it is almost impossible to completely eliminate all implementation vulnerabilities, it is certainly possible to minimize problems arising from them. A secure system is based on a design that takes into account security considerations and is well-implemented. Unfortunately, most of the time people don’t get things right, so there are such things as patches.

It always amazes me when system administrators fail to install vendor patches. Fixing problems and patching holes in the system is one of the primary responsibilities of any system administrator. The famous vulnerability in one of the versions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required