I have some questions related to the improved security in vserver.
If a have a service running in a vserver, and this service get compromised by
an attacker, is the attacker confined to the vserver, so that he/she can't
compromise any of the other services (running in other vservers), and he/she
can't modify files outside the filesystem of the compromised vserver?
Is a vserver context more secure than a chroot jail?
Received on Thu May 15 23:12:17 2008