The following sections assume the host in question either is not connected to a network or is connected to an isolated network; this is the best way to make sure no one compromises your system before you have had a chance to secure it. This appendix covers Solaris 2.8, Windows NT 4.0, Windows 2000, and Linux.