Overview – Describes how to protect legitimate files, label files and file systems, view hidden file permissions, and locate suspicious files. Also describes how to verify the integrity of files over time on Oracle Solaris systems.
Audience – System administrators.
Required knowledge – Site security requirements.
Documentation and resources for this product and related products are available at http://www.oracle.com/pls/topic/lookup?ctx=E37838-01.
Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.