Difference between revisions of "Research Securing Pre"
Jump to navigation
Jump to search
Tragicfame (talk | contribs) |
Tragicfame (talk | contribs) |
||
Line 9: | Line 9: | ||
** [[Research_Uploadd_| Uploadd facility]] | ** [[Research_Uploadd_| Uploadd facility]] | ||
** [[Research_PmLog_| PmLog (syslog alternative)]] | ** [[Research_PmLog_| PmLog (syslog alternative)]] | ||
+ | ** [[Research_Secure_Logging_Recommendations|Alternative Logging configuration for security and privacy]] | ||
* To be added to.... | * To be added to.... |
Revision as of 16:36, 15 September 2009
Intro
A rooted box with broadband capabilities running a web engine and Privacy Policy clipped to your belt? Anyone else nervous about this?
So here we'll explore some of the general best practices that sysadmins using Linux normally employ when securing their systems and how such practices can be used on the Palm Pre to provide a higher level of privacy and security on your device.
Some topics to consider:
- System Logging mechanisms
- To be added to....