Sponsored Content
Full Discussion: UNIX question
Top Forums UNIX for Dummies Questions & Answers UNIX question Post 302749767 by tamer11007 on Saturday 29th of December 2012 11:43:01 AM
Old 12-29-2012
Linux UNIX question

Pleas I want answer this question or reference or link website can find answer to
this question?



1. We consider that we are running on a UNIX system which uses ACL as a mechanism for file protection. Where is the protection information of the file stored?

2. In UNIX, each device is represented by a device, give an example of a file representing the hard disk storage device. Give the full listing of this file using the "ls -l" command. What are the protection flags (rwx) for this file and WHY are they like this? What would happen if the protection flags were equal to rw-rw-rw ?

3. What is the definition of MAC Times for UNIX systems? provide an example about the difference between the M flag and C flag.

4. A system administrator suspects that there is an attack on his machine; he needs to make a backup of the files to check when they have been modified. For this purpose he uses the "cp -r" instruction to copy the root directory. What is the problem with this and what other instruction should the administrator use in order to avoid this problem?

------------------------------------------------

1. What is a "two-factor" authentication?
2. Provide a full example of two-factor authentication where one factor is a password.
3. Could we use the mobile phone as part of this two-factor authentication?
4. Is "google" authentication a two-factor authentication system? What is the main problem with this device?


-----------------------------------------------
I am find answer when search on internet but i can't find all "Full Answer "

Pleas help me............. I need this information
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

unix question

How might you look at the last mail message someone sent you , without running the mail utility? (1 Reply)
Discussion started by: swetha
1 Replies

2. IP Networking

unix to unix serial connection question

hi there i'm a new bie just got few simple questions to ask. I got expert in windows configuration but totally new to unix environment . I want to make sure a com port (com1) is working, so I connect a 9-pin cable (CB9) for both PC using Unix environment (unix to unix). The question are (1)... (1 Reply)
Discussion started by: typsam
1 Replies

3. UNIX for Dummies Questions & Answers

Unix 10.2 question

I'm a verteran to Windows but i newbie to UNIX so i hope this isn't too dumb of a question. I have an HP 9000 D Class Server that has 10.2 and uses a console. The console died and i was told i can put a standard EISA video card in it and use a regualr monitor and keyboard. My question is how do i... (5 Replies)
Discussion started by: egress1
5 Replies

4. UNIX for Dummies Questions & Answers

Unix History Question: Why are filenames/dirnames case sentsitive in Unix?

I tried looking for the answer online and came up with only a few semi-answers as to why file and directory names are case sensitive in Unix. Right off the bat, I'll say this doesn't bother me. But I run into tons of Windows and OpenVMS admins in my day job who go batty when they have to deal... (3 Replies)
Discussion started by: deckard
3 Replies

5. UNIX for Dummies Questions & Answers

Question about unix

Hey everyone i am new to unix as well, has anybody heard of the script that allows you screen to look just like the Windows screen, if yea, what is it? (3 Replies)
Discussion started by: Gueso
3 Replies

6. Solaris

Unix Question

IF A program or database routine is writing in a file laying on unix box then how can be identify the process id which is writing in the file. Please let me know how can we do using root command and without root command? Regards, Shashank (10 Replies)
Discussion started by: TAPARIA
10 Replies

7. UNIX for Dummies Questions & Answers

a question about UNIX 5.0.6 , help me please

Dear friends I'm really new comer to this place and to this subject you will make me so happy if you help me about these questions: 1- I must install UNIX 5.0.6 because one of my work software will works ONLY on this version , so , I want to know WHERE CAN I DOWNLOAD A COMPELETE PACKAGE OF... (1 Reply)
Discussion started by: mrr53
1 Replies

8. UNIX for Dummies Questions & Answers

Unix question

When you enter your login id and password, what determines what program startsup? Is it always a Unix shell? (3 Replies)
Discussion started by: Alice Klein
3 Replies

9. UNIX for Beginners Questions & Answers

Question on UNIX

Hi, Can you please advise on answers of below 4 questions as I am not sure on the answers. 1. You are porting a C program that interacts over a network with remote systems. The program was originally written on AMD64 Linux. You are migrating it to SPARC Solaris architecture. Question Based on... (1 Reply)
Discussion started by: Vivekit82
1 Replies
SIVTEST(1)						      General Commands Manual							SIVTEST(1)

 *

NAME
sivtest - interactive MANAGESIEVE test program SYNOPSIS
sivtest [ -t keyfile ] [ -p port ] [ -m mechanism ] [ -a userid ] [ -u userid ] [ -k num ] [ -l num ] [ -r realm ] [ -f file ] [ -n num ] [ -c ] [ -i ] [ -o option=value ] [ -v ] hostname DESCRIPTION
sivtest is a utility that allows you to authenticate to a MANAGESIEVE server and interactively issue commands to it. Once authenticated you may issue any MANAGESIEVE command by simply typing it in. It is capable of multiple SASL authentication mechanisms and handles encryption layers transparently. This utility is often used for testing the operation of a timsieved server. Also those developing MANAGESIEVE clients find it useful. OPTIONS
-t keyfile Enable TLS. keyfile contains the TLS public and private keys. Specify "" to negotiate a TLS encryption layer but not use TLS authentication. -p port Port to connect to. If left off this defaults to sieve as defined in /etc/services. -m mechanism Force sivtest to use mechanism for authentication. If not specified the strongest authentication mechanism supported by the server is chosen. -a userid Userid to use for authentication; defaults to the current user. This is the userid whose password or credentials will be presented to the server for verification. -u userid Userid to use for authorization; defaults to the current user. This is the userid whose identity will be assumed after authentica- tion. NOTE: This is only used with SASL mechanisms that allow proxying (e.g. PLAIN, DIGEST-MD5). -k num Minimum protection layer required. -l num Maximum protection layer to use (0=none; 1=integrity; etc). For example if you are using the KERBEROS_V4 authentication mechanism specifying 0 will force sivtest to not use any layer and specifying 1 will force it to use the integrity layer. By default the max- imum supported protection layer will be used. -r realm Specify the realm to use. Certain authentication mechanisms (e.g. DIGEST-MD5) may require one to specify the realm. -f file Pipe file into connection after authentication. -n num Number of authentication attempts; default = 1. The client will attempt to do SSL/TLS session reuse and/or fast reauth (e.g. DIGEST-MD5), if possible. -c Enable challenge prompt callbacks. This will cause the OTP mechanism to ask for the the one-time password instead of the secret pass-phrase (library generates the correct response). -i Don't send an initial client response for SASL mechanisms, even if the protocol supports it. -o option=value Set the SASL option to value. -v Verbose. Print out more information than usual. SEE ALSO
timsieved(8) CMU
Project Cyrus SIVTEST(1)
All times are GMT -4. The time now is 10:46 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy