|
Secure Programming for Linux and Unix HOWTO | ||
---|---|---|
Prev | Chapter 7. Structure Program Internals and Approach | Next |
In network daemons, shed or limit excessive loads. Set limit values (using setrlimit(2)) to limit the resources that will be used. At the least, use setrlimit(2) to disable creation of ``core'' files. For example, by default Linux will create a core file that saves all program memory if the program fails abnormally, but such a file might include passwords or other sensitive data.
Hosting by: Hurra Communications Ltd.
Generated: 2007-01-26 17:57:48