Sponsored Content
The Lounge War Stories Prize of being an Admin - Part 2 Post 302836235 by Swathe on Tuesday 23rd of July 2013 08:00:06 PM
Old 07-23-2013
I'm a windows sysadmin by day but use nothing but *NIX whenever possible and I know some very competent Windows guys but I think across the board locally at leas the *NIX guys seem a little more competent, are more flexible and have a better understanding of the technology they use.
 

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

comparing part of header with part of detailed records.

Hi there, I am lil confused with the following issue. I have a File, which has the following header: IMSHRATE_043008_101016 a sample detailed record is :9820101 A982005000CAVG030108000000000000010169000MAR 2008 9820102 MAR 2008 D030108 ... (1 Reply)
Discussion started by: cmaroju
1 Replies

2. What is on Your Mind?

Windows Admin switching to *nix Admin

I'm currently a Windows admin and have wanted to jump ship to the *nix side for a while now. I've been studying both through an lpic level 1 manual as I have time (focusing on debian), and a solaris 10 cert book. The problem is I only have a handful of hours a week to study, and my current job... (3 Replies)
Discussion started by: bobwilson
3 Replies

3. War Stories

Prize of being an Admin

Was wondering if anyone has come across any situation where you do your best to help users and in return you get a nice escalation from top level management! Here's my story: One fine morning, I was sitting idle, doing next to nothing, I got an alert from helpdesk people about a problem with... (30 Replies)
Discussion started by: admin_xor
30 Replies

4. Shell Programming and Scripting

[Solved] Printing a part of the last line of the specific part of a file

Hi, I have 80 large files, from which I want to get a specific value to run a Bash script. Firstly, I want to get the part of a file which contains this: Name =A xxxxxx yyyyyy zzzzzz aaaaaa bbbbbb Value = 57 This is necessary because in a file there are written more lines which... (6 Replies)
Discussion started by: wenclu
6 Replies

5. What is on Your Mind?

Regarding Admin life either as DBA or UNIX Linux admin

I am planning to choose my career as Unix/Linux Admin or a DBA. But I have come to know from forums and few admins like the job will be 24/7. I have few questions on that. Can we get "DAY" shifts in any one of the admin Job ? Can't we have shift timings in any company ? Eventhough the... (7 Replies)
Discussion started by: Jacktts
7 Replies

6. UNIX for Beginners Questions & Answers

How to make a loop to read the input from a file part by part?

Hi All, We've a VDI infrastructure in AWS (AWS workspaces) and we're planning to automate the process of provisioning workspaces. Instead of going to GUI console, and launching workspaces by selecting individual users is little time consuming. Thus, I want to create them in bunches from AWS CLI... (6 Replies)
Discussion started by: arun_adm
6 Replies
forgeries(7)                                             Miscellaneous Information Manual                                             forgeries(7)

NAME
forgeries - how easy it is to forge mail SUMMARY
An electronic mail message can easily be forged. Almost everything in it, including the return address, is completely under the control of the sender. An electronic mail message can be manually traced to its origin if (1) all system administrators of intermediate machines are both coopera- tive and competent, (2) the sender did not break low-level TCP/IP security, and (3) all intermediate machines are secure. Users of cryptography can automatically ensure the integrity and secrecy of their mail messages, as long as the sending and receiving machines are secure. FORGERIES
Like postal mail, electronic mail can be created entirely at the whim of the sender. From, Sender, Return-Path, and Message-ID can all contain whatever information the sender wants. For example, if you inject a message through sendmail or qmail-inject or SMTP, you can simply type in a From field. In fact, qmail-inject lets you set up MAILUSER, MAILHOST, and MAILNAME environment variables to produce your desired From field on every message. TRACING FORGERIES
Like postal mail, electronic mail is postmarked when it is sent. Each machine that receives an electronic mail message adds a Received line to the top. A modern Received line contains quite a bit of information. In conjunction with the machine's logs, it lets a competent system administra- tor determine where the machine received the message from, as long as the sender did not break low-level TCP/IP security or security on that machine. Large multi-user machines often come with inadequate logging software. Fortunately, a system administrator can easily obtain a copy of a 931/1413/Ident/TAP server, such as pidentd. Unfortunately, some system administrators fail to do this, and are thus unable to figure out which local user was responsible for generating a message. If all intermediate system administrators are competent, and the sender did not break machine security or low-level TCP/IP security, it is possible to trace a message backwards. Unfortunately, some traces are stymied by intermediate system administrators who are uncooperative or untrustworthy. CRYPTOGRAPHY
The sender of a mail message may place his message into a cryptographic envelope stamped with his seal. Strong cryptography guarantees that any two messages with the same seal were sent by the same cryptographic entity: perhaps a single person, perhaps a group of cooperat- ing people, but in any case somebody who knows a secret originally held only by the creator of the seal. The seal is called a public key. Unfortunately, the creator of the seal is often an insecure machine, or an untrustworthy central agency, but most of the time seals are kept secure. One popular cryptographic program is pgp. SEE ALSO
pgp(1), identd(8), qmail-header(8) forgeries(7)
All times are GMT -4. The time now is 11:18 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy