|
|||
1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) 3. Working in Trusted Extensions (Tasks) 4. Elements of Trusted Extensions (Reference) Visible Features of Trusted Extensions Files and Applications in Trusted Extensions Password Security in the Solaris OS |
Workspace Security (Trusted GNOME)In Trusted Extensions, Trusted GNOME provides equivalent security to Trusted CDE, but the look and feel is different. As in Trusted CDE, desktop applications are label-aware. Applications run at the label of the current workspace, and display information only at the label of the process that opened the application. The location of security features differs in Trusted GNOME from their location in Trusted CDE. The behavior can also be different.
|
||
|