Deleted Added
full compact
security.7 (219096) security.7 (219126)
1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved.
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions
5.\" are met:
6.\" 1. Redistributions of source code must retain the above copyright
7.\" notice, this list of conditions and the following disclaimer.
8.\" 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
22.\" SUCH DAMAGE.
23.\"
1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved.
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions
5.\" are met:
6.\" 1. Redistributions of source code must retain the above copyright
7.\" notice, this list of conditions and the following disclaimer.
8.\" 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
22.\" SUCH DAMAGE.
23.\"
24.\" $FreeBSD: head/share/man/man7/security.7 219096 2011-02-28 10:03:48Z brucec $
24.\" $FreeBSD: head/share/man/man7/security.7 219126 2011-03-01 11:47:51Z brucec $
25.\"
26.Dd January 7, 2010
27.Dt SECURITY 7
28.Os
29.Sh NAME
30.Nm security
31.Nd introduction to security under FreeBSD
32.Sh DESCRIPTION

--- 100 unchanged lines hidden (view full) ---

133the attacker may not have a need to install a backdoor.
134Many of the root holes found and closed to date involve a considerable amount
135of work by the attacker to clean up after himself, so most attackers do install
136backdoors.
137This gives you a convenient way to detect the attacker.
138Making
139it impossible for an attacker to install a backdoor may actually be detrimental
140to your security because it will not close off the hole the attacker used to
25.\"
26.Dd January 7, 2010
27.Dt SECURITY 7
28.Os
29.Sh NAME
30.Nm security
31.Nd introduction to security under FreeBSD
32.Sh DESCRIPTION

--- 100 unchanged lines hidden (view full) ---

133the attacker may not have a need to install a backdoor.
134Many of the root holes found and closed to date involve a considerable amount
135of work by the attacker to clean up after himself, so most attackers do install
136backdoors.
137This gives you a convenient way to detect the attacker.
138Making
139it impossible for an attacker to install a backdoor may actually be detrimental
140to your security because it will not close off the hole the attacker used to
141break in in the first place.
141break in originally.
142.Pp
143Security remedies should always be implemented with a multi-layered
144.Dq onion peel
145approach and can be categorized as follows:
146.Bl -enum -offset indent
147.It
148Securing root and staff accounts
149.It

--- 857 unchanged lines hidden ---
142.Pp
143Security remedies should always be implemented with a multi-layered
144.Dq onion peel
145approach and can be categorized as follows:
146.Bl -enum -offset indent
147.It
148Securing root and staff accounts
149.It

--- 857 unchanged lines hidden ---