Inside the World of Secure Operating Systems

On a normal system, if an attacker gains root or administrator access, he or she can run rampant. Not so on a trusted system — at least so long as it is properly configured. Read the article at NewsFactor.

10 Comments

  1. 2003-04-09 6:26 am
  2. 2003-04-09 7:07 am
  3. 2003-04-09 7:11 am
  4. 2003-04-09 7:43 am
  5. 2003-04-09 9:20 am
  6. 2003-04-09 4:43 pm
  7. 2003-04-09 6:19 pm
  8. 2003-04-09 11:53 pm
  9. 2003-04-10 7:32 am
  10. 2003-04-10 10:30 am