On Wed, Sep 30, 2009 at 03:17:05PM +0200, Laurent Spagnol wrote:
> In fact, we don't have to run after the latest kernel releases, and in
> most of the cases the security holes comes from userland applications ...
>
> So:
> - i build my own kernels (IPv6, 'pseudo' loopback, and some new
> features that are usefull for me),
> - i take stability and updates from Debian,
> - and i continue to use my favorite distribution ;)
Do you have this SOP documented somewhere? I'm afraid I have
to do it myself (currently using stock Debian vserver kernels
and stock vserver-utils, which kinda, sorta work, but do suck)
in future.
-- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BEReceived on Wed Sep 30 14:28:05 2009