On Fri, 21 Mar 2014, Leon Fauster wrote:

> its just used in a multiple layer protection / security model.

Bingo! Same here. And it works well!

> well i would say its more scary when humans are editing configuration files 
> :-)

I can speak for nearly 20 years of experience on this, including
blowing it myself and locking myself remotely out of my own system
once. For what it is supposed to do...it does extremely well.

Gilbert

*******************************************************************************
Gilbert Sebenste                                                    ********
(My opinions only!)                                                  ******
*******************************************************************************
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to