Overview – Describes how to protect legitimate files, view hidden file permissions, and locate suspicious files. Also describes how to verify the integrity of files over time on Oracle Solaris systems.
Audience – System administrators.
Required knowledge – Site security requirements.
Documentation and resources for this product and related products are available at http://www.oracle.com/pls/topic/lookup?ctx=E53394-01.
Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.