In this conclusion to a four-part series on securing sendmail we discuss a number of options that will help you improve its security and make a few recommendations. This article is excerpted from chapter four of em sendmail fourth edition em written by Bryan Costales Claus Assmann George Jansen and Gregory Shapiro O Reilly 2 7 ISBN 59651 292 . Copyright 2 7 O Reilly Media Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O Reilly Media….
TAKE CONTROL OF REMOTE COMPUTERS Support, configure and install applications and updates remotely for greater efficiency.

More: continued here
Powered by A+ Computer Professionals