In this second part of a four-part series focusing on sendmail security you will learn how attackers use permissions to gain root privilege and how to keep them from doing so. It is excerpted from chapter four of em sendmail fourth edition em written by Bryan Costales Claus Assmann George Jansen and Gregory Shapiro O Reilly 2 7 ISBN 59651 292 . Copyright 2 7 O Reilly Media Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O Reilly Media….
Download a VMWare LAB MANAGER STARTER KIT, FREE! Virtualize the test lab while cutting costs. Get your Free Virtual Lab Starter Kit today.

More: continued here