Linux security: Authenticate your users and know what they're up toAug 01, 2007, 05:30 (0 Talkback[s])
(Other stories by Jack Loftus)
No-Size-Fits-All! An Application-Down Approach for Your Cloud Transformation REGISTER >
[ Thanks to Peter Parker for this link. ]
"Databases are one thing that is often overlooked. DBAs have access to most of the data in there, so IT managers will set them up as if they are in total control of all the data and access privileges. Managers who own all of the data in the IT environment don't have as much knowledge as they should about these databases.
0 Talkback[s] (click to add your comment)