SearchSecurity: Hardening Linux Networks With Open Source Tools, Part Two

You have used POP Mail–the protocol that allows single
user hosts to read mail from a server–for giving certificates to
e-mail users. In what circumstances is this

Todd Sanders: It is appropriate in all
circumstances, due to the security implications behind it. We feel
that, in security, the most important aspect of IT is the end user
and/or the client.

Complete Story

Related Story:
Why Snort, Nessus, OSS Build Secure IT Fortresses, Part 1
15, 2004)