<p dir="ltr">I once thought of doing checksum verification but that will not be sufficient so I moved in that direction.</p>
<div class="gmail_quote">On Feb 21, 2016 16:00, "Jan Schaumann" <<a href="mailto:jschauma@stevens.edu">jschauma@stevens.edu</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Avineshwar Singh <<a href="mailto:asingh16@stevens.edu">asingh16@stevens.edu</a>> wrote:<br>
<br>
> HW #3 says we need to confirm there is no introduction of backdoor<br>
> post installation of nginx. Is it sufficient if all the security<br>
> patches are installed<br>
<br>
Determining what is sufficient is up to you. If this wasn't a homework<br>
assignment, but a production server for your business or organization,<br>
how would you make this decision?<br>
<br>
Describing your thought process in the homework submission is more<br>
important than the actual steps or commands you're taking.<br>
<br>
-Jan<br>
_______________________________________________<br>
cs615asa mailing list<br>
<a href="mailto:cs615asa@lists.stevens.edu">cs615asa@lists.stevens.edu</a><br>
<a href="https://lists.stevens.edu/mailman/listinfo/cs615asa" rel="noreferrer" target="_blank">https://lists.stevens.edu/mailman/listinfo/cs615asa</a><br>
</blockquote></div>