I first encoundered security "protocols" like this when I read an article on SELinux.

What I'm curious to know, being new to these types of technologies, is which one is more effective at its job. From a layman's perspective, they seem to do essentially the same thing.


-- [EMAIL PROTECTED] mailing list



Reply via email to