slitaz-doc-wiki-data view meta/en/handbook/security.meta @ rev 65

Update meta folder.
author Christopher Rogers <slaxemulator@gmail.com>
date Fri Jun 10 17:49:38 2011 +0000 (2011-06-10)
parents 56e70d68fa80
children
line source
1 a:2:{s:7:"current";a:8:{s:4:"date";a:2:{s:7:"created";i:1266696378;s:8:"modified";i:1282075254;}s:7:"creator";s:5:"Rohit";s:11:"last_change";a:7:{s:4:"date";i:1282075254;s:2:"ip";s:13:"91.104.78.198";s:4:"type";s:1:"E";s:2:"id";s:20:"en:handbook:security";s:4:"user";s:5:"linea";s:3:"sum";s:0:"";s:5:"extra";s:0:"";}s:11:"contributor";a:1:{s:5:"linea";s:11:"Paul Issott";}s:5:"title";s:26:"SliTaz and System Security";s:11:"description";a:2:{s:15:"tableofcontents";a:8:{i:0;a:4:{s:3:"hid";s:26:"slitaz-and-system-security";s:5:"title";s:26:"SliTaz and System Security";s:4:"type";s:2:"ul";s:5:"level";i:1;}i:1;a:4:{s:3:"hid";s:15:"security-policy";s:5:"title";s:15:"Security Policy";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:2;a:4:{s:3:"hid";s:29:"root-the-system-administrator";s:5:"title";s:31:"Root - The system administrator";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:3;a:4:{s:3:"hid";s:9:"passwords";s:5:"title";s:9:"Passwords";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:4;a:4:{s:3:"hid";s:7:"busybox";s:5:"title";s:7:"Busybox";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:5;a:4:{s:3:"hid";s:19:"lighttpd-web-server";s:5:"title";s:19:"LightTPD web server";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:6;a:4:{s:3:"hid";s:10:"ssh-server";s:5:"title";s:10:"SSH Server";s:4:"type";s:2:"ul";s:5:"level";i:2;}i:7;a:4:{s:3:"hid";s:19:"pscan-ports-scanner";s:5:"title";s:21:"Pscan - Ports scanner";s:4:"type";s:2:"ul";s:5:"level";i:2;}}s:8:"abstract";s:351:"Security Policy
4 SliTaz has given a lot of consideration to system security. Applications are tested for many months before being included in the distribution. At boot time, a minimum of services are launched by the rc scripts. For a complete lists of daemons enabled, you can look at the RUN_DAEMONS variable in the /etc/rcS.conf configuration file:";}s:8:"internal";a:2:{s:5:"cache";b:1;s:3:"toc";b:1;}s:8:"relation";a:1:{s:10:"firstimage";s:0:"";}}s:10:"persistent";a:4:{s:4:"date";a:2:{s:7:"created";i:1266696378;s:8:"modified";i:1282075254;}s:7:"creator";s:5:"Rohit";s:11:"last_change";a:7:{s:4:"date";i:1282075254;s:2:"ip";s:13:"91.104.78.198";s:4:"type";s:1:"E";s:2:"id";s:20:"en:handbook:security";s:4:"user";s:5:"linea";s:3:"sum";s:0:"";s:5:"extra";s:0:"";}s:11:"contributor";a:1:{s:5:"linea";s:11:"Paul Issott";}}}