O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Remote-Access Control

Probably one of the weakest points in any network is remote access. Most security incidents occur over remote-access connections (whether a dial-up line or the Internet). The remote-access problem is further aggravated by the fact that you can’t disable it because it is needed and that its very nature should permit access from virtually anywhere. Therefore, the only solution to the remote-access issue is the use of strong encryption and authentication. Different circumstances warrant different solutions, ranging from IP Security Architecture (IPsec) for network-level security to Secure Shell (SSH) for application-level security. In no case should clear-text protocols such as telnet or rlogin be used for remote access over ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required