Security Configuration for a relic.


 
Thread Tools Search this Thread
Top Forums UNIX for Advanced & Expert Users Security Configuration for a relic.
# 1  
Old 06-24-2005
Question Security Configuration for a relic.

I have inherited a box with 3.4 running (very old) on it and would like to know if there is any good documentation for locking down the system. Other words a map for the configs that need to be done. Any help, Thanks.
# 2  
Old 06-28-2005
http://www.blacksheepnetworks.com/se...ardening4.html

Hardening Solaris with Jass

This article presents a concise step-by-step approach to securely installing Solaris for use in a firewall DMZ or other sensitive environment, using Sun's Jass tool (and with Solaris 8 the Sunscreen EFS lite firewall). This article was written (and tested) for Solaris 8, but the techniques described here should work fine on earlier versions too.


Tools to Help Harden Solaris
http://www.samag.com/documents/s=766...213d/0213d.htm
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Cybersecurity

Linux and Windows Configuration Security

Hi, I have the following situation and proposed solution: SITUATION I have a notebook computer. The manufacturer ships the hardware with a Windows OS (either XP Pro, Vista or Windows 7). They provide support only for a Windows OS. Also, I am not sure how fuss-free it is to use any Linux... (0 Replies)
Discussion started by: Hanz
0 Replies
Login or Register to Ask a Question