For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start.

This story continues at http://www.databasejournal.com/news/article.php/3627556