Networks, Authentication and Unix? 2
concerned-with-security asks: "A document about security on Linux will probably mention, among other things: shadow passwords, (open)ssh, PAM, Kerberos, NIS/NIS+ and PGP(GPG), but I have not yet found one that describes how all of these interrelate. Some of these programs seem to overlap; which would be preferred over others in various situations? Do you need different keys for the programs that use encryption, or does each program need its own key? If you did not want to use a commertial Linux distribution and chose instead to make your own, what combination of these programs would provide the most security on a small LAN with common user accounts on each machine?"
NIS/NIS+ (Score:1)
Read this book (Score:1)