Alex Knight wrote:
>
> On Wed, 27 Jun 2001, Steve Wolfe wrote:
>
> > > > 1) Distribution of Linux to have the largest number of "out of the box"
> > > > security holes. Check back and look at the security reports. Count them
> > if
> > > > you insist.
> > >
> > > And check for the number of them being Red Hat specific.
> >
> > I consider things like the portmapper being enabled by default Red Hat
> > specific.
> >
> > > > 3) So much extra crap running to begin with, eating up extra memory,
> > cpu,
> > > > etc.
> > >
> > > You're obviously unfamiliar with it.
> >
> > I don't know, I generaly turn off at least half of the services that are
> > enabled by default, which free up quite a bit of memory.
> >
> > steve
>
> Yup, which is my point. On a 30 server deployment, and tight schedules,
> deploying Debian is much smoother, cleaner, more secure, and less "after
> install" configuration to do.
>
> It's like cooking a 3 course meal... then having to _bake a cake_ for
> desert.
>
Has anyone tried using Trustix (http://www.trustix.net/)???
It's based upon RH 6.2...;-)
--
/) John Clark Naldoza y Lopez (\
/ ) Software Design Engineer II ( \
_( (_ _ Web-Application Development _) )_
(((\ \> /_> Cable Modem Network Management System <_\ </ /)))
(\\\\ \_/ / NEC Telecom Software Phils., Inc. \ \_/ ////)
\ / \ /
\ _/ phone: (+63 32) 233-9142 loc. 3112 \_ /
/ / cellphone: (+63 919) 399-4742 \ \
/ / email: njclark@ntsp.nec.co.jp \ \