Hi,
i am working on a research project at Centre for Information and network Security. we r currently studying a grsecurity as part of our research. i would like to know how v can configure users on my system to take full advantage of grsecurity.
this question might be basic to u guys...but i hope someone will answer me.
Regards,