On Tue, 25 Mar 2003 10:58:39 -0800, you wrote:
Unix is not immune to this, and as vendors like Red Hat change things that encourage people to run systems without fixing the known security holes we could find them coming to Linux.
-- I've never been canoeing before, but I imagine there must be just a few simple heuristics you have to remember...
-- Phoebe-list mailing list Phoebe-list@xxxxxxxxxx https://listman.redhat.com/mailman/listinfo/phoebe-list
[Home] [Kernel List] [Red Hat Install] [Red Hat Watch List] [DVD Store] [Red Hat Development] [Gimp] [Yosemite News]