home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!usc!news
- From: merlin@neuro.usc.edu (merlin)
- Newsgroups: comp.unix.sysv386
- Subject: Re: Single-user mode boot on SCO UNIX - not a solution
- Date: 31 Aug 1992 23:34:42 -0700
- Organization: University of Southern California, Los Angeles, CA
- Lines: 19
- Sender: merlin@neuro.usc.edu (merlin)
- Message-ID: <la63o2INN3cg@neuro.usc.edu>
- References: <syscrc.714768938@gsusgi1.gsu.edu> <1992Aug25.195455.1065@ksvltd.fi> <1992Aug28.201249.29451@smallo.bo.open.de>
- NNTP-Posting-Host: neuro.usc.edu
-
- In article <> oklein@smallo.bo.open.de (Olaf Klein) writes:
- >Unix was designed to be secure, especially the root account has to
- >be protected from hack attacks.
-
- A small nit - UNIX was not originally to be secure. Early UNIX systems
- were designed to encourage open access and sharing of information. The
- paranoid defensive application of system security controls did not come
- into widespread use until the introduction of UUCP ('77), Berknet ('78),
- and particularly 4.2BSD based TCP/IP ethernets ('83).
-
- ------------------------------------------------------------------------------
- Alexander-James Annala
- Principal Investigator
- Neuroscience Image Analysis Network
- HEDCO Neuroscience Building, Fifth Floor
- University of Southern California
- University Park
- Los Angeles, CA 90089-2520
- ------------------------------------------------------------------------------
-