9 More Discussions You Might Find Interesting
1. Cybersecurity
Hello there,
I would like to protect a Linux system from cloning, I don't mind if the cloned hard drive works in the same computer, but I need to avoid it to work in other one, even if it uses exactly same mainboard model and rest of computer parts. I want the cloned system to get frozen or... (4 Replies)
Discussion started by: Installimat
4 Replies
2. UNIX for Advanced & Expert Users
how to protect my process from others to kill??
Double post, continued here, thread closed (0 Replies)
Discussion started by: samrintu
0 Replies
3. IP Networking
Hi,
We have smb client running on two of the linux boxes and smb server on another linux system. During a backup operation which uses smb, read of a file was allowed while write to the same file was going on.Also simultaneous writes to the same file were allowed.Following are the settings in the... (1 Reply)
Discussion started by: swatidas11
1 Replies
4. Solaris
Hi Guys.
This is part of my filesystem structure :
Filesystem size used avail capacity Mounted on
/dev/md/dsk/d0 47G 5.2G 42G 12% /
/devices 0K 0K 0K 0% /devices
ctfs 0K 0K 0K 0% ... (2 Replies)
Discussion started by: aggadtech08
2 Replies
5. Cybersecurity
Hi!
Looking for some feed back on this tutorial...
Thank you for checking out this thread.
I'm working on some killer videos right now that will explain in detail how you can protect your website against hackers. The first part of the video series is live right now and it covers Cross-Site... (2 Replies)
Discussion started by: Arne1983
2 Replies
6. UNIX for Dummies Questions & Answers
Hello,
Can someone give me some recommendations on how to protect this account? I understand that this account is an "operator" account and has root access.
Thanks in advance (5 Replies)
Discussion started by: susie2345
5 Replies
7. UNIX for Advanced & Expert Users
We recently had an accidental delete from /. I hold the root password but others are allowed to sudo over to root to perform admin tasks. The only way I want to permit deletion from / is by physically being root (su -).
I'd like to add a line to the sudoers file which would permit all commands... (1 Reply)
Discussion started by: scottsl
1 Replies
8. Shell Programming and Scripting
Hello All,
i work with backup, The below script runs and tar the user specified dir and put it in a backup machine. can any one help me to modify this in such a was that the tar file generated can be given a users specific password so that it can have high security.
KINDLY LET ME... (2 Replies)
Discussion started by: pradeepmacha
2 Replies
9. UNIX for Dummies Questions & Answers
we have an hp-ux and a user requested me if i can password protect the dtterm. i know that this is possible but can you give me some hints in making this happen?
thanks :cool: (2 Replies)
Discussion started by: inquirer
2 Replies