How do we use it?

  1. custodians of trusted hosts
    1. file ownership
    2. devices
    3. rebooting
    4. apps
  2. applications:
    1. Network Supported
    2. Custodian Supported
  3. Local vs Network:
    1. When to keep data local
    2. When to run local
  4. Secure Shell
    1. telnet and ftp
    2. rlogin, rsh, and rcp