Author: JT Smith
Despite all the security systems you have in place, it is still possible that somebody has accessed your system and changed your configuration or security settings. Examine methods of storing and later checking the validity of your configuration files.Despite all the security systems you have in place, it is still possible that somebody has accessed your system and changed your configuration or security settings. Examine methods of storing and later checking the validity of your configuration files.
Link: ibm.com/developerworks
Category:
- Security