REPOST: Securing *NIX root access with SUDO
Securing root access by configuring SUDO In previous blog posts, we have enabled and used the root account to make changes to important *nix configuration files to tweak the system to perform in a manner more to our liking. For … Continue reading →