On Tue, Nov 14, 2000 at 08:59:49AM -0600, Jesse Pollard wrote:
[snip]
> 4. Unauthorized access to, modification to, or damage to the
>    effectiveness of the system should be possible (the ideal...).
>    All security related events should be audited and logged.

Uhmmm, there should be some kind of negation above, shouldn't it?!

[snip]


/David Weinehall
  _                                                                 _
 // David Weinehall <[EMAIL PROTECTED]> /> Northern lights wander      \\
//  Project MCA Linux hacker        //  Dance across the winter sky //
\>  http://www.acc.umu.se/~tao/    </   Full colour fire           </
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/

Reply via email to