Test your systems validity

35

Author: JT Smith

Despite all the security systems you have in place, it is still possible that somebody has accessed your system and changed your configuration or security settings. Examine methods of storing and later checking the validity of your configuration files.Despite all the security systems you have in place, it is still possible that somebody has accessed your system and changed your configuration or security settings. Examine methods of storing and later checking the validity of your configuration files.

Link: ibm.com/developerworks

Category:

  • Security