Debian Virtualization: Back to the Basics, part 3

Posted by netblue30 on Feb 11, 2014 9:22 AM EDT
Layer 3 Networking Blog
Mail this story
Print this story

The traditional Linux security model starts with file permissions. The model lets the kernel decide whether or not a process may access a resource based on permissions set as part of the filesystem. The coarse-grained granularity of this model often causes Linux processes to have too many rights. If more granularity is needed, one has to resort to adding security related code into the program source.

Full Story

  Nav
» Read more about: Groups: Linux, Virtualization

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.