How to design secure network applications based on privilege separation Anthony Pell 1 min read Nov 23, 2004 This talk describes what are the basic security functionalities under Unix needed to build privilege separation and how to use them to design more secure applications. How to design secure network applications based on privilege separation Prev: Practical Linux security Next: SSH without password:micro HOWTO