Network architect: Hardening Linux networks with open source tools, part two
You have used POP Mail -- the protocol that allows single user hosts to read mail from a server -- for giving certificates to e-mail users. In what circumstances is this appropriate?
Todd Sanders: It is appropriate in all circumstances, due to the security implications behind it. We feel that, in security, the most important aspect of IT is the end user and/or the client.
The link for this article located at Jan Stafford is no longer available.