---

SearchSecurity: Hardening Linux Networks With Open Source Tools, Part Two

You have used POP Mail–the protocol that allows single
user hosts to read mail from a server–for giving certificates to
e-mail users. In what circumstances is this
appropriate?

Todd Sanders: It is appropriate in all
circumstances, due to the security implications behind it. We feel
that, in security, the most important aspect of IT is the end user
and/or the client.


Complete Story

Related Story:
SearchEnterpriseLinux:
Why Snort, Nessus, OSS Build Secure IT Fortresses, Part 1
(Oct
15, 2004)

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis