Overview – Describes how to protect legitimate files, view hidden file permissions, and locate and prevent the execution of rogue files. Also describes how to verify the integrity of files over time on Oracle Solaris systems.
Audience – System administrators.
Required knowledge – Site security requirements.
Late-breaking information and known issues for this product are included in the documentation library at http://www.oracle.com/pls/topic/lookup?ctx=E36784.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.