Privilege Descriptions
How Processes Get Privileges
Privilege Escalation and Kernel Privileges
Files That Contain Privilege Information
Privilege Descriptions
Running a Browser in a Protected Environment
Determining Whether You Are Using a Profile Shell
How to Lock Down the MySQL Service