Installation

A secure installation is the first step toward a secure system. For this reason, it is not recommended that you use the upgrade option that is available during Solaris 8 installation. And although Solaris 8 may be installed over the network, this is not recommended either. To be absolutely sure that you will be building on secure ground, install the operating environment using the initial installation method from the authentic and original installation CD-ROM media. It is important not to have the system connected to any network during installation and configuration to avoid risks associated with unconfigured but networked systems. There are essentially two ways to install Solaris 8:

  • Install the complete distribution set and then ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.