58 Chapter 7:Frequently Asked QuestionsHat engineers as well as the Linux community around the world through Bugzilla.The tickets are then evaluated and resolved by the Red Hat engineering. After beingtested by the Red Hat quality assurance team, the package updates are released aspart of the Red Hat errata list. Notifications received from RHN include all Red Haterrata.Q: How secure is Red Hat Network?A: Red Hat Network uses the following levels of security:• The Red Hat Network Web Application is only accessible with the correct username and password• A Digital Certificate is stored on the client system (/etc/sysconfig/rhn/systemid)after registration and is used to authenticate the system during each transactionbetween the client and Red Hat Network• All notifications and information messages are signed by Red Hat with an elec-tronic signature using GNU Privacy Guard (GPG). RPM can be used to verify theauthenticity of the package before it is installed• All transactions are encrypted using a Secure Sockets Layer (SSL) connection• All packages are tested and verified by the Red Hat Quality Assurance Teambefore they are added to the official Red Hat errata list and Red Hat NetworkQ: Why do you need to know so much personal information about my system?A: Red Hat makes every effort to allow our customers to define the relationship theywill have with us.We require your personal information so that we can contact you easily if issues ariseaffecting the security of your information or systems. In addition, sharing this in-formation with us makes it harder for someone to steal your identity. If you shouldforget your Red Hat login, you can call Customer Service to access your account.This information will help protect your account from unauthorized access.Your system hardware and package profiles are required to give you the most relevantinformation about what affects your systems. Without these profiles, you’ll have tosift through tons of information to find what you need.