Lines Matching full:system
11 this fine grained approach to constraining the danger to your system
14 Notes on securing your system
17 Adopting a role approach to system security:
19 changing all of the system binaries and directories to be owned by
21 the name 'system' who's account is locked with a '*' password. This
22 user can be made the owner of all of the system directories on your
23 system and critical system binaries too.
30 system user. It can be protected by using a wrapper like execcap to
39 the system owned by root, it becomes significantly harder for such a
40 daemon to damage your system.
53 system in a form that can sometimes be manipulated by file