Loading...
 

Audience

Audience


This text is thought as a mixture of a tutorial, a blog and a technical instruction. While a tutorial only tells you step by step what to do to finish a job, a blog can show you the typical pitfalls. At some places i want to stray chapters that are detailed almost like a technical reference.
The reader should have a good knowledge of Unix and some basic knowledge of kryptography. He should be able to describe the different classical mehods to authenticate to a unix system: passwd, shadow and NIS. He should know the basics about secure network protocols. But just read on....
Created by admin. Last Modification: Sunday 14 of August, 2005 20:02:29 GMT-0000 by admin.

Flattr me!