Archive Items from the Tech Mavens archive, published 2001 and earlier Secure Data Exchange More Flexible File Permmisions with Solaris ACLs 8 Myths of Computer Security Getting the Most from a Consultant Countering SYN Flood Denial-of-Service Attacks