"Keep in mind that if a machine is compromised, anything on that system could have been modified, including the kernel, binaries, datafiles, running processes, and memory. In general, the only way to trust that a machine is free from backdoors and intruder modifications is to reinstall the operating system from the distribution media and install all of the security patches before connecting back to the network."
- CERT Coordination Center
Starfish Systems
www.starfishsystems.ca
information security by design
(604) 916-7871
 
Services Software Community About Us

Winning starts before the race begins

motorcycle race

Businesses which innovate in technology can only maintain their edge as long as their computing environment consistently delivers on performance, stability, and security. That's why they rely on Linux and open source software, because nothing else gives them unlimited freedom to innovate.

Starfish Systems delivers open source system consulting services, one success at a time.
Our expertise is your freedom. Now go out there and win.