Default installations of almost any operating system are prime targets for hackers, and Solaris is no installations are usually devoid of any vendor patches, may be running system daemons with more privilege than necessary, and are likely to use insecure chapter is designed to get you to begin thinking about Solaris in terms of security by examining the shortcomings of the default Solaris installation, as well as the tools available for monitoring the system. Most intrusions will result in your Solaris systems displaying uncharacteristic.