On Tue, Nov 14, 2000 at 08:59:49AM -0600, Jesse Pollard wrote:
[snip]
> 4. Unauthorized access to, modification to, or damage to the
> effectiveness of the system should be possible (the ideal...).
> All security related events should be audited and logged.
Uhmmm, there should be some kind of negation above, shouldn't it?!
[snip]
/David Weinehall
_ _
// David Weinehall <[EMAIL PROTECTED]> /> Northern lights wander \\
// Project MCA Linux hacker // Dance across the winter sky //
\> http://www.acc.umu.se/~tao/ </ Full colour fire </
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/